Search results for: ENERGY SECURITY
-
The Issue of Operating Security Systems in Terms of the Impact of Electromagnetic Interference Generated Unintentionally
Publication -
Reliability analysis of aerodrome’s electronic security systems taking into account electromagnetic interferences
Publication -
DETERMINANTS OF THE PROVISION OF MARITIME TRAVEL IN THE CONTEXT OF A SENSE OF SECURITY OF GENERATION Y REPRESENTATIVES
Publication -
EFFECTIVENESS OF THE SANDPITS SECURITY SYSTEM AGAINST MICROORGANISMS AND INTESTINAL PARASITES SAND CONTAMINATION
Publication -
Operational analysis of threats to the security of NATO’s eastern flank. Context of hybrid activities
Publication -
Remote task submission and publishing in BeesyCluster: security and efficiency of Web Service interface
PublicationPrezentujemy nowy system BeesyCluster, który stanowi łatwy w użyciu portal dostępowy do rozszerzalnej sieci usług wdrożonych i opublikowanych na klastrach/komputerach PC z wirtualnymi płatnościami za wykorzystanie usług. Administratorzy/użytkownicy mogą dołączać klastry/komputery PC dostępne poprzez SSH kliknięciem myszy bez konieczności dalszej konfiguracji na klastrze/komputerze PC udostępniającego. Ponadto, użytkownicy mogą...
-
THE SITUATION OF WOMEN IN THE POLISH LABOUR MARKET IN THE LIGHT OF CHANGES IN THE PENSION SECURITY SYSTEM
PublicationThe aim of the study is to examine the opinion of a group of women on their economic activity and decisions related to retirement. The first part of the article reviews previous research related to the economic activity of older people with a special focus on women. In the empirical part of the article, women’s opinions on issues related to retirement were analyzed. The research was carried out in 2016 on a sample of 45 women,...
-
Performance and Security Testing for Improving Quality of Distributed Applications Working in Public/Private Network Environments
PublicationThe goal of this dissertation is to create an integrated testing approach to distributed applications, combining both security and performance testing methodologies, allowing computer scientist to achieve appropriate balance between security and performance charakterstics from application requirements point of view. The constructed method: Multidimensional Approach to Quality Analysis (MA2QA) allows researcher to represent software...
-
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
PublicationBiometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...
-
Market Price Prediction of Property Rights from Gas Fired Plants or Plants with Total Installed CHP Source Capacity Below 1 MW until 2025
PublicationThe resolution on the Polish Energy Policy until 2030 (PEP-30) was adopted by the Council of Ministers on 10 November 2009. The document specifies the combined electricity and heat generation as a direction of pursuing the goals of energy efficiency, fuel and energy supply security, competitive fuel and energy markets development, and reduction of the energy sector’s environmental impact. PEP-30 assumes that electricity generation...
-
Enhancing voice biometric security: Evaluating neural network and human capabilities in detecting cloned voices
PublicationThis study assesses speaker verification efficacy in detecting cloned voices, particularly in safety-critical applications such as healthcare documentation and banking biometrics. It compares deeply trained neural networks like the DeepSpeaker with human listeners in recognizing these cloned voices, underlining the severe implications of voice cloning in these sectors. Cloned voices in healthcare could endanger patient safety by...
-
Current challenges and methodological issues of functional safety and security management in hazardous technical systems
PublicationCelem artykułu jest zidentyfikowanie problemów oceny ryzyka w kontekście stosowania systemów elektrycznych / elektronicznych / programowalnych elektronicznych (E/E/PE) z uwzględnieniem aspektów bezpieczeństwa funkcjonalnego i zabezpieczeń (ochrony). Zadaniem rozwiązań bezpieczeństwa funkcjonalnego jest efektywne redukowanie ryzyka wychodząc z poziomu nieakceptowanego. Ryzyko jest definiowane jako kombinacja prawdopodobieństwa wystąpienia...
-
Machine Learning for Control Systems Security of Industrial Robots: a Post-covid-19 Overview
Publication -
A rough cut cybersecurity investment using portfolio of security controls with maximum cybersecurity value
Publication -
Ranking of Generation Source Locations by a Hybrid Multi-Criteria Method
PublicationThe paper presents a ranking of the locations of eight renewable energy sources (RES) made using a hybrid multi-criteria analysis method. The method is a combination of the analytical hierarchical process (AHP) method and numerical taxonomy. The considered generating sources, i.e. solar plants, biogas plants, and wind farms are sources that will significantly contribute to implementing the provisions of the energy and climate package...
-
Organizational culture as prerequisite of proactive safety and security management in critical infrastructure systems including hazardous plants and ports
PublicationThis article addresses selected aspects of organizational culture to be considered in the context of knowledge based proactive safety and security management of plants, ports and systems of critical infrastructure. It has been often emphasized in the domain literature that business effectiveness of such plants and their resilience against hazards and threats to avoid major accidents depends substantially on human and organizational...
-
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublicationIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
Architecture of security and application layer structure of radio system for monitoring and acquisition of data from traffic enforcement cameras
PublicationThe study presents architecture of security and application layer structure of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras. It also provides general assumptions concerning the range of the system as well as its modules and application components.
-
Distributed measurement system with data transmission secured using XXTEA algorithm
PublicationThe paper deals with wireless data transmission security in the distributed measurement and control system. An overview of cryptographic algorithms was presented paying special attention to the algorithm dedicated to units with low processing power, which is important due to minimization of energy consumption. Measurement modules equipped with simple microcontrollers send data wirelessly to the central unit. The transmission was...
-
Low Frequency Electromagnetic Interferences Impact on Transport Security Systems Used in Wide Transport Areas
Publication -
Bound entanglement maximally violating Bell inequalities: quantum entanglement is not fully equivalent to cryptographic security
PublicationW pracy pokazano, że czterokubitowy stan o splątaniu związanym może maksymalnie łamać prostą nierówność Bella podobną do standardowej nierówności CHSH. Prostota rozważanego układu oraz odporność splątania sprawiają, że łamanie to jest obiecujące dla współczesnej technologii eksperymentalnej. Z drugiej strony, splątanie tego stanu nie pozwala na destylację bezpiecznego klucza kryptograficznego, zatem ani splątanie, ani maksymalne...
-
Bezpieczeństwo Bankowości Internetowej Wobec Współczesnych Cyberzagrożeń = INTERNET BANKING SECURITY IN TERMS OF CONTEMPORARY CYBERTHREATS
PublicationW niniejszej pracy zostały opisane aktualne podejścia do zabezpieczeń bankowości internetowej. Przeanalizowane jest bezpieczeństwo bankowości internetowej 7 banków polskich wobec współczesnych rodzajów cyberataków (takich jak ataki na użytkowników niemieckich banków w 2017 roku z wykorzystaniem luk bezpieczeństwa w systemie SS7). Zaproponowane są dwa podejścia do zabezpieczeń ochrony środków klientów banku wobec tych zagrożeń
-
Business continuity management framework for Industry 4.0 companies regarding dependability and security of the ICT and ICS/SCADA system
PublicationThis chapter addresses a business continuity management (BCM) framework for the Industry 4.0 companies including the organizational and technical solutions, regarding the dependability and security of the information and telecommunication technology (ICT), and the industrial control system (ICS) / supervisory control and data acquisition (SCADA) system. These technologies and systems play nowadays important roles in modern advanced...
-
Procedure based functional safety and information security management of industrial automation and control systems on example of the oil port installations
PublicationThe approach addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety and security requirements specified in standards IEC 61508, IEC 61511 and IEC 62443. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of...
-
The impact of security aspects on functional safety analysis = Wpływ aspectów ochrony informacji na wyniki analiz bezpieczeństwa funkcjonalnego
PublicationIt can be said that a distributed control and protection system’s security level may have a significant impact on functional safety analyses and their results. However the issue of integrating those both aspects are difficult and usually is neglected during functional safety analyses. Known methods of functional safety analyses don’t take into consideration this kind of concept also. This paper discusses an attempt to integrate...
-
Comprehensive thermodynamic analysis of steam storage in a steam cycle in a different regime of work: A zero-dimensional and three-dimensional approach
PublicationDue to the current trends aiming to reduce carbon dioxide emissions by increasing the use of renewable energy sources, changes are required in the operation of coal-fired steam units. The unstable nature of renewable energy sources, depending on weather conditions, means that the amount of energy produced varies and is not always in line with peak demand. To ensure the security and stability of energy supplies in the energy system,...
-
Tracking of the broadband source of the underwater noise in the very shallow water conditions
PublicationThe paper contains the result s, both theoretical and experimental , connected with the tracking of the underwater noise source as small ships, pontoon , diver and so on. The pro blem of security in the shallow water area is the challenge for underwater acousticians. In this paper there is take n into account the detection of the sources that move on the surface of the sea or underwater in shallow...
-
Comparison of AHP and Numerical Taxonomy Methods Based on Biogas Plant Location Analysis
PublicationThe paper presents a comparison of the multi-criteria Analytic Hierarchy Process (AHP) method and numerical taxonomy in biogas plant location selection. Biogas plants are sources that will significantly contribute to the implementation of the provisions of the energy and climate package for Poland by 2030. Increasing the share of energy produced from renewable sources, e.g. biogas plants, will increase the country’s energy security....
-
Indicator Analysis of Security Risk for Electronic Systems Used to Protect Field Command Posts of Army Groupings
Publication -
Issues Related to Power Supply Reliability in Integrated Electronic Security Systems Operated in Buildings and Vast Areas
Publication -
Shock a disposable time in electronic security systems / Porażenie a czas dyspozycyjny w elektronicznych systemach bezpieczeństwa
Publication -
Zagrożenia starych budynków w sąsiedztwie nowej zabudowy = The threat of old buildings security in neighbourhood of new buildings
PublicationNa przykładzie jednego z budynków mieszkalnych, przedstawiono zagrożenia na jakie są narażone stare obiekty w zwartej zabudowie śródmiejskiej, podczas prowadzenia w ich sąsiedztwie prac budowlanych, którym często towarzyszą głębokie wykopy. Powoduje to powstawanie licznych uszkodzeń, uniemozliwiających ich prawidłową eksploatację lub stanowiących nawet zagrożenie bezpieczeństwa.
-
Adaptive system for recognition of sounds indicating threats to security of people and property employing parallel processing of audio data streams
PublicationA system for recognition of threatening acoustic events employing parallel processing on a supercomputing cluster is featured. The methods for detection, parameterization and classication of acoustic events are introduced. The recognition engine is based onthreshold-based detection with adaptive threshold and Support Vector Machine classifcation. Spectral, temporal and mel-frequency descriptors are used as signal features. The...
-
Innovative Web-Based Geographic Information System for Municipal Areas and Coastal Zone Security and Threat Monitoring Using EO Satellite Data
PublicationThe paper presents a novel design of a Web-based Safe City & Coastal Zone GIS (SCCZ-GIS). The system integrates data acquired from different remote sensing and geospatial data sources for the purpose monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilises several innovative technologies and solutions, and is capable of direct co-operation with different remote sensing data sources...
-
An Approach to the Detection of Bank Robbery Acts Employing Thermal Image Analysis
PublicationA novel approach to the detection of selected security-related events in bank monitoring systems is presented. Thermal camera images are used for the detection of people in difficult lighting conditions. Next, the algorithm analyses movement of objects detected in thermal or standard monitoring cameras using a method evolved from the motion history images algorithm. At the same time, thermal images are analyzed in order to detect...
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublicationThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
Learning from mistakes within organizations: An adaptive network-oriented model for a double bias perspective for safety and security through cyberspace
PublicationAlthough making mistakes is a crucial part of learning, it is still often being avoided in companies as it is considered as a shameful incident. This goes hand in hand with a mindset of a boss who dominantly believes that mistakes usually have negative consequences and therefore avoids them by only accepting simple tasks. Thus, there is no mechanism to learn from mistakes. Employees working for and being influenced by such a boss...
-
Determinants of Internet use regarding shopping preferences, COVID-19 pandemic occurrence, perception of security and Internet marketing – a case study of Poland
Publication -
The investment process in the power supply industry
PublicationThe basis for power supply industry programming in a market economy should be the principle of sustainable development, which must take into account maintaining an adequate level of energy security on the one hand, and the aim to preserve the maximum degree of non-renewable resources on the other hand. Therefore, the overriding aim should be a strive to meet the current and prospective demand for energy and fuel, in conjugation...
-
Functional safety and cyber security analysis for life cycle management of industrial control systems in hazardous plants and oil port critical infrastructure including insurance
PublicationThis report addresses selected methodological aspects of proactive reliability, functional safety and cyber security management in life cycle of industrial automation and control systems (IACS) in hazardous plants and oil port critical installations based on the analysis of relevant hazards / threats and evaluation of related risks. In addition the insurance company point of view has been also considered, because nowadays the insurer,...
-
Electricity demand prediction by multi-agent system with history-based weighting
PublicationEnergy and load demand forecasting in short-horizons, over an interval ranging from one hour to one week, is crucial for on-line scheduling and security functions of power system. Many load forecasting methods have been developed in recent years which are usually complex solutions with many adjustable parameters. Best-matching models and their relevant parameters have to be determined in a search procedure. We propose a hybrid...
-
Macro-nutrients recovery from liquid waste as a sustainable resource for production of recovered mineral fertilizer: Uncovering alternative options to sustain global food security cost-effectively
PublicationGlobal food security, which has emerged as one of the sustainability challenges, impacts every country. As food cannot be generated without involving nutrients, research has intensified recently to recover unused nutrients from waste streams. As a finite resource, phosphorus (P) is largely wasted. This work critically reviews the technical applicability of various water technologies to recover macro-nutrients such as P, N, and...
-
Zarządzanie zaufaniem w bezprzewodowych sieciach czujników - studium przypadku
PublicationW artykule przedstawiono studium przypadku dotyczące zastosowania bezprzewodowej sieci czujników do wspomagania pacjenta z nadwagą w jego środowisku domowym. Przyjęto, że sieć wykorzystuje metodę rozproszonego zarządzania zaufaniem i pokazano, że metoda ta umożliwia wykrycie i izolację czujników realizujących działania sprzeczne z polityką sieci. Ilościowe oszacowanie czasu niezbędnego do wykrycia takich...
-
Warstwowa ocena epidemiologiczna architektury zakładów opiekuńczo-leczniczych i zakładów gieriatycznych = Layer based epidemiological quality assessment of architecture of care security and geriatric wards
PublicationW artykule opisano możliwość wykorzystania autorskiej metody warstwowej oceny epidemiologicznej (WOE) do oceny potencjalnego ryzyka zakażeń w obiektach przeznaczonych dla osób starszych. Materiał i metody: W celu weryfikacji możliwości użycia metody WOE do oceny zagrożeń w zakresie bezpieczeństwa epidemiologicznego środowiska zbudowanego poddano analizie dostępne źródła literatury związane z obowiązującymi w Polsce wymaganiami...
-
International Conference on Sustainable Energy Information Technology
Conferences -
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublicationDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
Impact of laser beam welding on mechanical behaviour of 2.25Cr–1Mo (P22) steel
PublicationThe use of welding processes in the manufacturing and repair of structures intended for the energy industry plays a key role in the guarantee of a continuous supply of fossil fuels, which is the basic condition for ensuring energy security. A square butt joint of 10 mm thick plate of 2.25Cr–1Mo (P22) steel was fabricated by autogenous laser beam welding process and then post-weld heat treatment (PWHT) for two sets of process parameters...
-
Fatigue and Professional Burnout in Police Officers and Firefighters
PublicationExcessive demands, work overload and the working time arrangements are an important cause of burnout and fatigue in employees. Specific working time arrangements are characteristic of the internal security services, such as police officers and firefighters. This applies to both the ordering of day and night shifts and the length of shifts. Depletion of personal resources is a common component for acute fatigue and burnout. However,...
-
Damage Detection Strategies in Structural Health Monitoring of Overhead Power Transmission System
PublicationOverhead power transmission lines, their supporting towers, insulators and other elements create a highly distributed system that is vulnerable to damage. Typical damage scenarios cover cracking of foundation, breakage of insulators, loosening of rivets, as well as cracking and breakage of lines. Such scenarios may result from various factors: groundings, lightning strikes, floods, earthquakes, aeolian vibrations, conductors galloping,...
-
Magnetic Porous Material Derived from Ni-MOF for the Removal of Tetracycline from Aqueous Solution
PublicationThe efficient removal of antibiotic residues from aqueous solution is very important for water security. Studies have found that adsorption is widely used for the removal of antibiotics due to its cost-effectiveness, low energy consumption, simplicity of operation, and environmental friendliness. In this study, a novel magnetic porous carbon adsorbent (Ni-MPC-400) with a high adsorption capacity and saturation magnetization was...