Search results for: PRESENTATION ATTACK DETECTIONS
-
Carbon nanowalls: A new versatile graphene based interface for laser desorption/ionization-mass spectrometry detection of small compounds in real samples.
PublicationCarbon nanowalls, vertically aligned graphene nanosheets, attract attention owing to their tunable band-gap, high conductivity, high mechanical robustness, high optical absorbance and other remarkable properties. In this paper, we report for the first time, the use of hydrophobic boron-doped carbon nanowalls (CNWs) for laser desorption/ionization of small compounds and their subsequent detection by mass spectrometry (LDI-MS). The...
-
Electrical Stimulation Modulates High Gamma Activity and Human Memory Performance
PublicationDirect electrical stimulation of the brain has emerged as a powerful treatment for multiple neurological diseases, and as a potential technique to enhance human cognition. Despite its application in a range of brain disorders, it remains unclear how stimulation of discrete brain areas affects memory performance and the underlying electrophysiological activities. Here, we investigated the effect of direct electrical stimulation...
-
State Interventionism in Tax System - Example of Action in a COVID-19 Crisis
PublicationThe following article presents and classifies changes in tax systems of selected countries as well as counts them as the response to the emergence of the crisis caused by the COVID-19 pandemic. Such actions were undertaken the context of state interventionism in the tax system. In order to achieve the objective of presenting the state interventionism in the context of tax rates, an analysis of the literature on the phenomenon described,...
-
Accuracy of Differential Phase Delay Estimation for GPS Spoofing Detection
PublicationGPS spoofing is an attack based on transmission of false signals to target receivers, in order to force the computation of incorrect time, position or velocity information. It is a threat which is recently considered with continuously growing awareness. There is a need for effective way of GPS spoofing detection. Many groups of methods are proposed in the literature. Spatial processing methods are considered to be robust in a wide...
-
Min-max optimization of node‐targeted attacks in service networks
PublicationThis article considers resilience of service networks that are composed of service and control nodes to node-targeted attacks. Two complementary problems of selecting attacked nodes and placing control nodes reflect the interaction between the network operator and the network attacker. This interaction can be analyzed within the framework of game theory. Considering the limited performance of the previously introduced iterative...
-
Analysis of spatial changes in the town of Puck with its surroundings in the years 1926, 1940, 1974, 1985, 2000, 2020 on the basis of topographic maps using the BDOT10K database
Open Research DataSpatial changes over time are extremely valuable due to the possibility of modeling forecasts. This dataset shows how Puck has evolved over a specific period of time. Thanks to this presentation of the data set, it is possible to easily recreate the appearance of the city in particular years.
-
A synthetic result of the development of personnel risk factors in the A, B, C, D enterprise
Open Research DataThe data below presents the shape of all the researched personnel risk factors in the A, B, C, D enterprise (which were tested by the author). Further considerations should be started with the presentation of the synthesis of the obtained results, which is presented in this research data.
-
Software for calculation of noise maps implemented on the supercomputer
PublicationThis paper presents investigation results relevant to the implementation of the algorithms for the calculation of noise maps. The aim of the implementation of the algorithms on the computer cluster is explained. Selected implementation details of the software called the noise propagation model are described. The interaction of the software with the data acquisition system is presented. Noise maps obtained by exploitation of the...
-
Multimedia distributed system for visualization of ongoing and archival events for BG
PublicationThe paper presents concept of the distributed system designed to gather and provide the information about vehicles, vessels and airplanes present within the area of operations of the Border Guard supplemented with related multimedia. The part of the system related to the map data gathering, distribution and visualization has been already implemented in the preceding project. The presented system is the expansion of the previous...
-
Retrieval with Semantic Sieve
PublicationThe article presents an algorithm we called Semantic Sieve applied for refining search results in text documents repository. The algorithm calculates socalled conceptual directions that enables interaction with the user and allows to narrow the set of results to the most relevant ones. We present the system where the algorithm has been implemented. The system also offers in the presentation layer clustering of the results into...
-
Koncepcja i symulacja polowa generatora o zmiennej częstotliwości. Zastosowanie w autonomicznych systemach elektroenergetycznych = Conception and field simulations of a variable frequency generator. Application for autonomous power generation system
PublicationStreszczenie angielskie: This paper covers a conception and simulation results for a brushless synchronous generator working with variable speed in an autonomous energy generation system (e.g. airplane power grid, hybrid vehicle, micro-CHP). The papers has two parts: presentation of the generator conception used in modern autonomous energy generation systems, and simulation results using filed model elaborated in Flux2D software....
-
Approach to security assessment of critical infrastructures' information systems
PublicationThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
High temperature corrosion of evaporator tubes with thermal sprayed coatings
PublicationDegradation examinations of outer surface of low-emission steam boiler evaporator tubes are presented in the paper. Metallographic evaluation of scale morphology, its micro sites chemical composition analysis and distribution of elements on cross sections have been performed. Water-wall tubes were exposed in steam boiler for up to two years period. Common tubes made of 16Mo3 steel suffered sulphide and molten salts corrosions....
-
Microscopic examination of the texture of paper products
Open Research DataAtomic force microscopy (AFM) can be used to study the state of the paper fibers with the aim of providing qualitative and semi-quantitative information on degradation and aging. The work [1] reports the results of tests of various paper products subjected to deliberate aging processes under the influence of various factors. Chemical and biological...
-
Renewable Energy Sources - W/C/L, E+MiBM, sem.05, (PG_00042100) - Nowy
e-Learning CoursesPresentation of the modern achievements and tendencies in the area of renewable energy resources utilization. Classification of renewable energy resources. Possibilities of renewable energy resources utilization. Discussion of theoretical backgrounds of selected technologies.
-
Renewable Energy Sources, WIMiO, Energetyka, I st., sem. 03, stacjonarne, (PG_00042100), semestr zimowy 2023/2024
e-Learning CoursesPresentation of the modern achievements and tendencies in the area of renewable energy resources utilization. Classification of renewable energy resources. Possibilities of renewable energy resources utilization. Discussion of theoretical backgrounds of selected technologies.
-
Software Modeling from the Perspective of Intuitive Information Processing
PublicationThere is psychological evidence that humans process information not only consciously but also intuitively. Intuitive information processing is present also during the activities related to software modeling. The goal of this paper is to analyze software modeling from the perspective of theories which describe intuitive (nonconscious, implicit) information processing. The paper includes presentation of relevant psychological theories,...
-
Influence of the Delay in Monitor System on the Motor Coordination of Musicians while Performing
PublicationThis paper provides a description and results of measurements of the maximum acceptable value of delay tolerated by a musician, while playing an instrument, that does not cause de-synchronization and discomfort. First, methodology of measurements comprising audio recording and a fast camera is described. Then, themeasurement procedure for acquiring the maximum value of delay conditioning...
-
Economic benefits of dynamic charging of electric buses
PublicationDiesel engines buses are still the most used type of buses. Electric buses provide promising green alternatives and a lot of advantages, but their main disadvantages are limited travel range and long charging time. This article is a presentation of innovative solution for charging of electric busses - Dynamic Charging (IMC). The modern IMC system in Solingen was presented. At the end of the article, a proposal was made to introduce...
-
The Digital Research Revolution
PublicationMarketing research has been through a significant evolution in the digital age. The evolution of technology has had a cross-cutting impact on the discipline. In light of this, a perspective is presented on how this impact has been reflected in marketing research. A review of traditional techniques is provided, followed by a description of the reconceptualization of traditional methods resulting from the application of new technologies....
-
Quality control of cheese samples for the presence of natamycin preservative – A natural deep eutectic solvent (NADES) based extraction coupled with HPLC
PublicationA new protocol for the determination of natamycin – an antifungal agent used as a food preservative - in cheese samples – is described. This new method is based on a natural deep eutectic solvent (NADES) green extraction procedure. High-performance liquid chromatography (HPLC) was used for detection and quantification. NADESs with different molar ratios were evaluated for efficient and selective extraction. NADES made of thymol...
-
Practical issues for the implementation of survivability and recovery techniques in optical networks
PublicationFailures in optical networks are inevitable. They may occur during work being done for the maintenance of other infrastructures, or on a larger scale as the result of an attack or large-scale disaster. As a result, service availability, an important aspect of Quality of Service (QoS), is often degraded. Appropriate fault recovery techniques are thus crucial to meet the requirements set by the Service Level Agreements (SLAs) between...
-
Explainable AI for Inspecting Adversarial Attacks on Deep Neural Networks
PublicationDeep Neural Networks (DNN) are state of the art algorithms for image classification. Although significant achievements and perspectives, deep neural networks and accompanying learning algorithms have some important challenges to tackle. However, it appears that it is relatively easy to attack and fool with well-designed input samples called adversarial examples. Adversarial perturba-tions are unnoticeable for humans. Such attacks...
-
A Multi-Antenna Scheme for Early Detection and Mitigation of Intermediate GNSS Spoofing
PublicationThis article presents a method for detecting and mitigating intermediate GNSS spoofing. In this type of attack, at its early stage, a spoofer transmits counterfeit signals which have slight time offsets compared to true signals arriving from satellites. The anti-spoofing method proposed in this article fuses antenna array processing techniques with a multipath detection algorithm. The latter is necessary to separate highly correlated...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublicationFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
Enzymatic activities behind degradation of glucosinolates
PublicationMyrosinase (thioglucosidase, EC 3.2.1.147) is the enzyme responsible for the hydrolysis of glucosinolates (GLs). In plant tissue, myrosinase and GLs are sequestered in separate cellular compartments. As a result of cell disruption, e.g., after pathogen attack or on chopping or grinding during food preparation, the myrosinase comes into contact with GLs and catalyzes the hydrolysis of thioglucosidic bond in GL structure. Consequently,...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublicationThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Trustworthiness and Subversion in Large Service- Oriented Multi-Agent Systems under Virtual Anonymity and Blind Provider Selection
PublicationTo promote honest service provision in multi-agent systems, a Computational Trustworthiness and Rating scheme collects service ratings and computes agents' trustworthiness levels (TLs). Studies of existing schemes fail to reflect closed-loop dynamics of TLs arising from the mutual influence of agents' behavior and TLs, and to capture relevant properties. Recent simulative and analytical models produce results tied to a particular...
-
System of specific grants for local government units in Poland
PublicationThe article analyses the system of specific grants in local governments in Poland. First, main revenue sources of local self-governments are presented. Their presentation is based upon the consideration of one of the basic important principles in democratic states today, i.e. decentralization. The text then, in more details, describes specific grants with respect to the European Charter of Local Self-Government. Subsequently, the...
-
Teleportation of geometric structures in 3D
PublicationThe simplest quantum teleportation algorithms can be represented in geometric terms in spaces of dimensions 3 (for real state vectors) and 4 (for complex state vectors). The geometric representation is based on geometric-algebra coding, a geometric alternative to the tensor-product coding typical of quantum mechanics. We discuss all the elementary ingredients of the geometric version of the algorithm: geometric analogs of states...
-
Mathematical Models in Design Process of Ship Bow Thrusters
PublicationThe presentation is about an application of simulation models for computer-aided design of ship bow thrusters. Generation of simulation models of ship bow thruster requires development and verifying of mathematical models of system component elements. Using the results of simulation the expert system is able to determine, that the rules of classification societies are met. Design procedures and mathematical models are part of an...
-
The Imaging of Gdansk Bay Seabed by Using Side Sonar
PublicationThis paper is mainly aimed at presentation of an impact of environmental conditions on imaging accuracy by using hydro-acoustic systems in waters of a high non-uniformity of spatial distribution of hydrological parameters. Impact of refraction on erroneous estimation of range, in case of wave radiation into water under a large angle, like in side sonars or multi-beam echo-sounders, is especially important. In this paper seasonal...
-
Squares in Gdansk as a City Value = Skwery, jako wartościowe przestrzenie publiczne Gdańska
PublicationThe article emphasizes potential of public urban squares. The attention is focused on squares of the city of Gdansk which constitute the potential for enhancing the image of the city. Presentation of three examples of small scale intervention in the Montreal's public spaces is depicting such a potential and is underlining different roles the public space can perform in the city structure. Revitalization of urban squares is influencing...
-
CSR in Polish SMEs- from perception to infatuation. Examples of socially engaged firms from Pomeranian Region
PublicationDespite the increasing worldwide awareness of the importance of social issues in con-temporary business management, Polish small and medium-sized enterprises seem to re-main in the group of followers, certainly not leaders, of the corporate social responsibility (CSR) movement, and this despite important dissemination efforts by numerous institu-tions. The aim of this paper is to present the bumpy road to the (still incomplete)...
-
Visual and auditory attention stimulator for assisting pedagogical therapy . Stymulator uwagi wzrokowej i słuchowej do wspomagania terapii pedagogicznej
PublicationVisual and auditory attention stimulator provides a system developed in order to improve reading skills using simultaneous presentation of text in its visual form and in transformed auditory form accompanied by related movie material. The described research employed 40 children at the age of 8 13 years having difficulties in learning of reading, who were diagnosed as having developmental dyslexia. It was shown that application...
-
Ernst Cassirer's Idea of the Critique of Knowledge
PublicationArticle is a systematic and historical presentation of a specific understanding of the idea of transcendentalism, developed in so called Marburg School of neo-Kantianism. Their unique line of interpretation of Kant’s critical philosophy which consisted in contrasting critical (relational) and dogmatic (substantial) understanding of basic philosophical concepts is characteristic, from one hand, of Marburg School of idealism and,...
-
Complexity analysis of the Pawlak’s flowgraph extension for re-identification in multi-camera surveillance system
PublicationThe idea of Pawlak’s flowgraph turned out to be a useful and convenient container for a knowledge of objects’ behaviour and movements within the area observed with a multi-camera surveillance system. Utilization of the flowgraph for modelling behaviour admittedly requires certain extensions and enhancements, but it allows for combining many rules into a one data structure and for obtaining parameters describing how objects tend...
-
Next generation ITS implementation aspects in 5G wireless communication network
PublicationIn the paper the study of Intelligent Transportation systems implementation in the 5G wireless communication network is presented. Firstly, small-cell concept in Ultra Dense Heterogeneous network was analyzed. Secondly, the 5G network requirements were presented which are important from the point of view of transportation systems development. Next, the study on the 5G network architectures proposals dedicated to the ITS systems...
-
Visual and Auditory Attention Stimulator for Assisting Pedagogical Therapy
PublicationVisual and auditory attention stimulator provides a system developed in order to improve reading skills using simultaneous presentation of text in its visual form and in transformed auditory form accompanied by related movie material. The described research employed 40 children at the age of 8 13 years having difficulties in learning of reading, who were diagnosed as having developmental dyslexia. It was shown that application...
-
The System of the Supervision and the Visualization of Multimedia Data for BG
PublicationMonitoring of country maritime border is an important task of the Border Guard. This task can be facilitated with the use of the technology enabling gathering information from distributed sources and its supervision and visualization. The system presented in the paper is an extension and enhancement of the previously developed distributed system map data exchange system. The added functionalities allow supplementation of map data...
-
Analysis of the state of preservation the historic arcaded houses in Vistula Delta listed in the National Inventory of Historical Monuments
PublicationHistoric arcaded houses are part of the material heritage of the Vistula Delta. Unfortunately, their number is decreasing year by year. The article is the result of a query of available sources and field research carried out by the author in 2015-2020. The paper presents the current state of preservation the historic arcaded houses in Vistula Delta listed in the National Inventory of Historical Monuments. Criteria for the selection...
-
Roman Śmierzchalski prof. dr hab. inż.
PeopleRoman Śmierzchalski born in 1956 in Gdynia. He received the M.Sc. degree in 1979, the Ph.D. degree in 1989, both from the Gdańsk University of Technology, and the D.Sc. (‘habilitation’) degree in 1999 from the Warsaw University of Technology. From 1980 to 2009 he was an academic teacher and researcher with the Gdynia Maritime University, and since 2009 he has been with the Gdansk University of Technology, where he is currently...
-
TEM data of (Cr,Fe,Mn,Co,Ni)3O4 High-entropy spinel oxide thin films deposited on amorphous SiO2 substrate by spray pyrolysis techniqe
Open Research DataThis Dataset include presentation of summarized TEM investigation of (Mn,Co,Fe,Ni,Cr)3O4 high-entropy spinel oxide prepared in the form of a ~ 500 nm thin film utilising a facile spray pyrolysis technique. The structural and electrical properties of the layers were characterised after exposure to temperatures in the range of 400–900 ◦C. The as-deposited...
-
Quality Model for Integrated Security Monitoring and Control in Water Distribution Systems
PublicationThis article addresses the problem of drinking water distribution system (DWDS) security in the terms of water quality which in the era of terrorist threat is of high importance to the public. The contribution of this paper is the development of the so called security module to extend a multi-species water quality model. This gives an insight to the situation in DWDS not only under normal operational conditions but also in case...
-
Optimal shape design of multi-element trawl-doors using local surrogate models
PublicationTrawl-doors have a large influence on the fuel consumption of fishing vessels. Design and optimiza-tion of trawl-doors using computational models are a key factor in minimizing the fuel consump-tion. This paper presents an optimization algorithm for the shape design of trawl-door shapes using computational fluid dynamic (CFD) models. Accurate CFD models are computationally expensive. Therefore, the direct use of traditional optimization...
-
Graph security testing
PublicationSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
Multisine impedimetric monitoring with an in-depth distribution of relaxation times analysis of WE43 and AZ31 magnesium alloys corrosion
PublicationThis research aims to develop and utilize an impedance-based tool for monitoring non-stationary electrochemical processes, coupling the multisinusoidal perturbation signal approach and distribution of relaxation times (DRT) analysis for the first time. The approach was used to distinguish independent processes occurring at the surface of AZ31 and WE43 Mg alloys undergoing corrosion in Hank’s Balanced Salt Solution at 37 °C. We...
-
Risk Analysis by a Probabilistic Model of the Measurement Process
PublicationThe aim of the article is presentation of the testing methodology and results of examination the probabilistic model of the measurement process. The case study concerns the determination of the risk of an incorrect decision in the assessment of the compliance of products by measurement. Measurand is characterized by the generalized Rayleigh distribution. The model of the meas-urement process was tested in parallel mode by six risk...
-
Radar data fusion in the STRADAR system
PublicationThe main task of the Polish Border Guard is protection of the country’s border which requires utilization of multimedia surveillance systems automatically gathering, processing and sharing various data. The paper presents such a system developed for the Maritime Division of the Polish Border Guard within the STRADAR project and the problem of fusion of radar data in this system. The system, apart from providing communication means,...
-
Monitoring działania wzmocnienia gruntu pod nasypem drogowym za pomocą sztywnych kolumn
PublicationOpis systemu pomiarowego zainstalowanego w kolumnach betonowych wzmacniających słabe podłoże gruntowe pod nasypem drogowym. Wstępne przedstawienie przykładowych wyników pomiarów. Problematyka niedokładności i odchyleń pomiarowych oraz sposób ich interpretacji.