Filters
total: 2699
-
Catalog
- Publications 1596 available results
- Journals 106 available results
- Conferences 80 available results
- Publishing Houses 1 available results
- People 32 available results
- Projects 13 available results
- e-Learning Courses 34 available results
- Events 1 available results
- Open Research Data 836 available results
displaying 1000 best results Help
Search results for: IOT SECURITY FEATURES
-
The EU's Cyber Security Strategy
Publication -
On some aspects of maritime security
PublicationZostały przedstawione wybrane zagadnienia dotyczące ochrony żeglugi, w tym opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS, Statkowy System Alarmowania (SSAS) oraz system AIS i System Identyfikacji i Śledzenia Dalekiego Zasięgu (LRIT). Przedstawiono również znaczenie nowoczesnej telekomunikacji dla potrze sprawnej ochrony żeglugi na morzach i oceanach
-
Quantum security and theory of decoherence
PublicationWe sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...
-
Playback Attack Detection: The Search for the Ultimate Set of Antispoof Features
PublicationAutomatic speaker verification systems are vulnerable to several kinds of spoofing attacks. Some of them can be quite simple – for example, the playback of an eavesdropped recording does not require any specialized equipment nor knowledge, but still may pose a serious threat for a biometric identification module built into an e-banking application. In this paper we follow the recent approach and convert recordings to images, assuming...
-
Distributed Detection of Selected Features in Data Streams Using Grid-class Systems
PublicationThis chapter describes basic methodology of distributed digital signal processing. A choice of distributed methods of detection of selected features in data streams using grid-class systems is discussed. Problems related to distribution of data for processing are addressed. A mitigating method for data distribution and result merging is described.
-
An IoT-Based Computational Framework for Healthcare Monitoring in Mobile Environments
PublicationThe new Internet of Things paradigm allows for small devices with sensing, processing and communication capabilities to be designed, which enable the development of sensors, embedded devices and other ‘things’ ready to understand the environment. In this paper, a distributed framework based on the internet of things paradigm is proposed for monitoring human biomedical signals in activities involving physical exertion. The main...
-
Experiment with small objects floating under water in the harbor security aspect.
PublicationObservation of the underwater area is the element of general trend which primary purpose is to protect and enhance the safety of the selected region. The aim of the paper is to present the acoustic characteristics of typical objects floating on the surface or under the water, which constitute some knowledge on how to detect these objects. Create a catalog of acoustic signatures and acoustic images of objects mostly floating under...
-
Mini-Cave Automatic Virtual Environment Application in Security, Safety, and Defence Studies
PublicationThe aim of the article is to analyse the use of mini-Cave Automatic Virtual Reality Environment (mini-CAVE) in academic studies on security, safety, and defence. The literature review based on Web of Science database and the case study of the War Studies University research activities indicated the mini-CAVE can be used in two areas as a research infrastructure and as a didactic tool. It can be concluded that due to the development...
-
Using angular dependence of multibeam echo features in seabed classification
PublicationThe new approach to seabed classification based on processing multibeam sonar echoes is presented. The multibeam sonars, besides their well verified and widely used applications like high resolution bathymetry measurements or underwater object imaging, are also the promising tool in seafloor identification and classification, having several advantages over conventional single beam echosounders. The proposed seabed classification...
-
Organizational culture as prerequisite of proactive safety and security management in critical infrastructure systems including hazardous plants and ports
PublicationThis article addresses selected aspects of organizational culture to be considered in the context of knowledge based proactive safety and security management of plants, ports and systems of critical infrastructure. It has been often emphasized in the domain literature that business effectiveness of such plants and their resilience against hazards and threats to avoid major accidents depends substantially on human and organizational...
-
Procedure based functional safety and information security management of industrial automation and control systems on example of the oil port installations
PublicationThe approach addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety and security requirements specified in standards IEC 61508, IEC 61511 and IEC 62443. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of...
-
Practical Trial for Low-Energy Effective Jamming on Private Networks With 5G-NR and NB-IoT Radio Interfaces
PublicationFourth-generation (4G) mobile networks are successively replaced by fifth-generation (5G) ones, based on the new releases of the 3rd Generation Partnership Project (3GPP) standard. 5G generation is dedicated to civilian users and the conducted analytical work shows that it has numerous technological gaps that prevent its direct implementation in military communications systems. However, the recent armed world conflicts showed that...
-
Rapid design optimization of compact couplers using response features and adjoint sensitivities
PublicationA technique for rapid EM-driven design optimization of compact microwave couplers is presented. Our approach exploits response features and adjoint sensitivities and allows for low-cost design closure both in terms of performance enhancement and structure miniaturization. It is demonstrated using a compact rat-race coupler working at 1 GHz and compared to adjoint-based gradient optimization.
-
Performance and Security Testing for Improving Quality of Distributed Applications Working in Public/Private Network Environments
PublicationThe goal of this dissertation is to create an integrated testing approach to distributed applications, combining both security and performance testing methodologies, allowing computer scientist to achieve appropriate balance between security and performance charakterstics from application requirements point of view. The constructed method: Multidimensional Approach to Quality Analysis (MA2QA) allows researcher to represent software...
-
Reliable Microwave Modeling By Means of Variable-Fidelity Response Features
PublicationIn this work, methodologies for low-cost and reliable microwave modeling are presented using variable-fidelity response features. The two key components of our approach are: (i) a realization of the modeling process at the level of suitably selected feature points of the responses (e.g., S-parameters vs. frequency) of the structure at hand, and (ii) the exploitation of variable-fidelity EM simulation data, also for the response...
-
Open extensive IoT research and measurement infrastructure for remote collection and automatic analysis of environmental data.
PublicationInternet of Things devices that send small amounts of data do not need high bit rates as it is the range that is more crucial for them. The use of popular, unlicensed 2.4 GHz and 5 GHz bands is fairly legally enforced (transmission power above power limits cannot be increased). In addition, waves of this length are very diffiult to propagate under field conditions (e.g. in urban areas). The market response to these needs are the...
-
Response features for fast EM-driven design of miniaturized impedance matching transformers
PublicationA framework for low-cost EM-driven design optimization of compact impedance matching transformers is presented. Our technique is based on a bottom-up design where design requirements for the transformer circuit are translated into specifications for its building blocks. These elementary cells are optimized using response features. Subsequently, the entire circuit is fine-tuned using local response surface approximation models and...
-
The impact of security aspects on functional safety analysis = Wpływ aspectów ochrony informacji na wyniki analiz bezpieczeństwa funkcjonalnego
PublicationIt can be said that a distributed control and protection system’s security level may have a significant impact on functional safety analyses and their results. However the issue of integrating those both aspects are difficult and usually is neglected during functional safety analyses. Known methods of functional safety analyses don’t take into consideration this kind of concept also. This paper discusses an attempt to integrate...
-
Non-invasive follicular thyroid neoplasm with papillary-like nuclear features (NIFTP) - Female, 67 - Tissue image [11010630088562471]
Open Research DataThis is the histopathological image of THYROID GLAND tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Non-invasive follicular thyroid neoplasm with papillary-like nuclear features (NIFTP) - Female, 67 - Tissue image [11010630088563951]
Open Research DataThis is the histopathological image of THYROID GLAND tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Non-invasive follicular thyroid neoplasm with papillary-like nuclear features (NIFTP) - Female, 67 - Tissue image [11010630088562991]
Open Research DataThis is the histopathological image of THYROID GLAND tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Non-invasive follicular thyroid neoplasm with papillary-like nuclear features (NIFTP) - Female, 67 - Tissue image [11010630088569751]
Open Research DataThis is the histopathological image of THYROID GLAND tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Non-invasive follicular thyroid neoplasm with papillary-like nuclear features (NIFTP) - Female, 67 - Tissue image [11010630088565141]
Open Research DataThis is the histopathological image of THYROID GLAND tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Non-invasive follicular thyroid neoplasm with papillary-like nuclear features (NIFTP) - Female, 67 - Tissue image [11010630088569271]
Open Research DataThis is the histopathological image of THYROID GLAND tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Non-invasive follicular thyroid neoplasm with papillary-like nuclear features (NIFTP) - Female, 67 - Tissue image [11010630088567711]
Open Research DataThis is the histopathological image of THYROID GLAND tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Non-invasive follicular thyroid neoplasm with papillary-like nuclear features (NIFTP) - Female, 67 - Tissue image [3300730069456521]
Open Research DataThis is the histopathological image of THYROID GLAND tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
EVALUATION OF SOUND QUALITY FEATURES ON ENVIRONMENTAL NOISE EFFECTS – A CASE STUDY APPLIED TO ROAD TRAFFIC NOISE
PublicationThe paper shows a study on the relationship between noise measures and sound quality (SQ) features that are related to annoyance caused by the traffic noise. First, a methodology to perform analyses related to the traffic noise annoyance is described including references to parameters of the assessment of road noise sources. Next, the measurement setup, location and results are presented along with the derived sound quality features....
-
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublicationIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
INCREASING THE COUNTRY'S SECURITY AND PUBLIC TRANSPORT ACCESSIBILITY BY CREATING A NETWORK OF SMALL AIRPORTS
PublicationIt has been shown that by creating a network of small airports, it is possible to increase the communication accessibility of large population groups and the country's security, including safety at sea. The airports mentioned above may also be located on land considered to be weak from an engineering point of view. These include, for example, wetlands, swamps, flood embankments, poor coastal belt grounds, and reclaimed land. A...
-
Multimedia Communications, Services and Security MCSS. 10th International Conference, MCSS 2020, Preface
PublicationMultimedia surrounds us everywhere. It is estimated that only a part of the recorded resources are processed and analyzed. These resources offer enormous opportunities to improve the quality of life of citizens. As a result, of the introduction of a new type of algorithms to improve security by maintaining a high level of privacy protection. Among the many articles, there are examples of solutions for improving the operation of...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublicationThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublicationThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
A study on of music features derived from audio recordings examples – a quantitative analysis
PublicationThe paper presents a comparative study of music features derived from audio recordings, i.e. the same music pieces but representing different music genres, excerpts performed by different musicians, and songs performed by a musician, whose style evolved over time. Firstly, the origin and the background of the division of music genres were shortly presented. Then, several objective parameters of an audio signal were recalled that...
-
IoT-Based Smart Monitoring System Using Automatic Shape Identification
Publication -
Trust-Based Model for the Assessment of the Uncertainty of Measurements in Hybrid IoT Networks
PublicationThe aim of this paper is to introduce a NUT model (NUT: network-uncertainty-trust) that aids the decrease of the uncertainty of measurements in autonomous hybrid Internet of Things sensor networks. The problem of uncertainty in such networks is a consequence of various operating conditions and varied quality of measurement nodes, making statistical approach less successful. This paper presents a model for decreasing the uncertainty...
-
Estymacja parametrów kanału NB-IoT w łączu w dół.
PublicationArtykuł dotyczy doboru metody estymacji parametrów kanału, odpowiedniej do zastosowania w terminalu wąskopasmowego Internetu Rzeczy. Przedstawiono strukturę sygnału pilotowego NRS, używanego do wyznaczenia współczynników kanału w LTE-NB. Zaproponowano cztery warianty metody wyznaczenia współczynników kanału dla całej ramki transmisyjnej. Dokonano oceny tych wariantów w oparciu o dwa wskaźniki jakościowe skojarzone z błędem odtworzonych...
-
Indo-French Defence and Security Partnership
Publication -
The Impact of Terrorism on International Peace and Security
Publication -
An integrated method for security protocols analysis
Publication -
Architecture supporting security of agent systems
PublicationW rozprawie zaproponowano nową architekturę bezpieczeństwa wspomagającą anonimowość w systemach agentowych. Moduł I architektury zapewnia funkcjonalność protokołu ochrony przed tropieniem (ang. untraceability), z tą zaletą, że nie wprowadza ograniczeń wobec agentów samodzielnie ustalających trasę własnej wędrówki. Stanowi rdzeń architektury, który zaimplementowano jako rozszerzenie platformy agentowej JADE, udostępniane publicznie...
-
Aspects of maritime security and safety of Poland
PublicationReferat przedstawia wybrane aspekty morskiego bezpieczeństwa Polski. Prezentacja problematyki jest ukierunkowana na problemy techniczne związane z bezpieczeństwem, pozostawiając na uboczu problemy prawne, logistyczne i społeczne. Na wstępie przedstawiono analizę zagrożeń dla bezpieczeństwa Bałtyku. Następnie opisano wybrane instytucje odpowiedzialne za morskie bezpieczeństwo Polski, ze szczegółowym uwzględnieniem Morskiej Straży...
-
Spiral Search Grasshopper Features Selection with VGG19-ResNet50 for Remote Sensing Object Detection
PublicationRemote sensing object detection plays a major role in satellite imaging and is required in various scenarios such as transportation, forestry, and the ocean. Deep learning techniques provide efficient performance in remote sensing object detection. The existing techniques have the limitations of data imbalance, overfitting, and lower efficiency in detecting small objects. This research proposes the spiral search grasshopper (SSG)...
-
Radio system for monitoring and acquisition of data from traffic enforcement cameras - features and assumptions of the system
PublicationThe study presents the architecture and selected functional assumptions of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (RSMAD). Ultimately, the system will be used for transmission and archiving image data of traffic offenses, but can also perform other duties related to traffic safety. Implementation of the RSMAD system will facilitate, inter alia, issuing the fine process and supervision...
-
Architecture of security and application layer structure of radio system for monitoring and acquisition of data from traffic enforcement cameras
PublicationThe study presents architecture of security and application layer structure of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras. It also provides general assumptions concerning the range of the system as well as its modules and application components.
-
Multi-Camera Vehicle Tracking Using Local Image Features and Neural Networks
PublicationA method for tracking moving objects crossing fields of view of multiple cameras is presented. The algorithm utilizes Artificial Neural Networks (ANNs). Each ANN is trained to recognize images of one moving object acquired by a single camera. Local image features calculated in the vicinity of automatically detected interest points are used as object image parameters. Next, ANNs are employed to identify the same objects captured...
-
Modelling of some stealth features for a small navy ship at the concept design stage - part II
PublicationIn the paper a few problems associated with modelling the basic stealth features for a small ship at the concept design stage are introduced. One problem concerns the modification of the immersed ship hull using the rapid change of the ship loading condition. The second is associated with the modification of the ship boundary layer by the hull skin cover. The other stealth features of the ship are not presented in this paper. The...
-
CARDINAL REGENERATIVE FEATURES OF THE MRL MOUSE — AN UPDATE
Publication -
Genetic features of clinical Pseudomonas aeruginosa strains
PublicationW grupie 62 izolatów klinicznych sprawdzono obecność 6 wybranych czynnikow wirulencji. We wcześniejszych badaniach z wykorzystaniem techniki ERIC - PCR wykazano, że w analizowanej grupie 49 (79%) to szczepy, o dużum podobieństwie genetycznym (ponad 62%), każdy z pozostałych 13 izolatów zaliczono do osobnego genotypu, o zdecydownie niższym stopniu pokrewieństwa. W przypadku wszystkich 49 szczepów z pierwszej grupy stwierdzono obecność...
-
Selection of Features for Multimodal Vocalic Segments Classification
PublicationEnglish speech recognition experiments are presented employing both: audio signal and Facial Motion Capture (FMC) recordings. The principal aim of the study was to evaluate the influence of feature vector dimension reduction for the accuracy of vocalic segments classification employing neural networks. Several parameter reduction strategies were adopted, namely: Extremely Randomized Trees, Principal Component Analysis and Recursive...
-
Vowel recognition based on acoustic and visual features
PublicationW artykule zaprezentowano metodę, która może ułatwić naukę mowy dla osób z wadami słuchu. Opracowany system rozpoznawania samogłosek wykorzystuje łączną analizę parametrów akustycznych i wizualnych sygnału mowy. Parametry akustyczne bazują na współczynnikach mel-cepstralnych. Do wyznaczenia parametrów wizualnych z kształtu i ruchu ust zastosowano Active Shape Models. Jako klasyfikator użyto sztuczną sieć neuronową. Działanie systemu...