Filters
total: 2699
-
Catalog
- Publications 1596 available results
- Journals 106 available results
- Conferences 80 available results
- Publishing Houses 1 available results
- People 32 available results
- Projects 13 available results
- e-Learning Courses 34 available results
- Events 1 available results
- Open Research Data 836 available results
displaying 1000 best results Help
Search results for: IOT SECURITY FEATURES
-
COMPUTERS & SECURITY
Journals -
Health Security
Journals -
Food Security
Journals -
African Security
Journals -
Democracy & Security
Journals -
European Security
Journals -
Asian Security
Journals -
Security Challenges
Journals -
INTERNATIONAL SECURITY
Journals -
Security Forum
Journals -
Security and Privacy
Journals -
Water Security
Journals -
SECURITY STUDIES
Journals -
Security Journal
Journals -
SECURITY DIALOGUE
Journals -
User Authentication by Eye Movement Features Employing SVM and XGBoost Classifiers
PublicationDevices capable of tracking the user’s gaze have become significantly more affordable over the past few years, thus broadening their application, including in-home and office computers and various customer service equipment. Although such devices have comparatively low operating frequencies and limited resolution, they are sufficient to supplement or replace classic input interfaces, such as the keyboard and mouse. The biometric...
-
Generalized Formulation of Response Features for Reliable Optimization of Antenna Input Characteristics
PublicationElectromagnetic (EM)-driven parameter adjustment has become imperative in the design of modern antennas. It is necessary because the initial designs rendered through topology evolution, parameter sweeping, or theoretical models, are often of poor quality and need to be improved to satisfy stringent performance requirements. Given multiple objectives, constraints, and a typically large number of geometry parameters, the design closure...
-
Optimal selection of input features and an acompanying neural network structure for the classification purposes - skin lesions case study
PublicationMalignant melanomas are the most deadly type of skin cancers however detected early enough give a high chances for successful treatment. The last years saw the dynamic growth of interest of automatic computer-aided skin cancer diagnosis. Every month brings new research results on new approaches to this problem, new methods of preprocessing, new classifiers, new ideas to follow etc. In particular, the rapid development of dermatoscopy,...
-
Low-Profile ESPAR Antenna for RSS-Based DoA Estimation in IoT Applications
PublicationIn this paper, we have introduced a low-profile electronically steerable parasitic array radiator (ESPAR) antenna that can successfully be used to estimate the direction-of-arrival (DoA) of incoming signals in wireless sensor network (WSN) applications, in which the height of the complete antenna has to be low. The proposed antenna is over three times lower than high-profile ESPAR antenna designs currently available in the literature...
-
Network-assisted processing of advanced IoT applications: challenges and proof-of-concept application
PublicationRecent advances in the area of the Internet of Things shows that devices are usually resource-constrained. To enable advanced applications on these devices, it is necessary to enhance their performance by leveraging external computing resources available in the network. This work presents a study of computational platforms to increase the performance of these devices based on the Mobile Cloud Computing (MCC) paradigm. The main...
-
Performance and Security Testing of Distributed Applications Working in Public/Private IPSec and HTTPS Environments
PublicationW pracy przedstawiono zagadnienie testowania wydajności (ang. Performance) i bezpieczeństwa (ang. Security) aplikacji rozproszonych działających w sieciach publiczno-prywatnych stworzonych przy wykorzystaniu technologii IPSec i HTTPS. Dwa podejścia do architektury oprogramowania tych aplikacji zostały omówione: Request/Response oraz Publish/Subscribe. Analiza zawiera przedstawienie wpływu technologii IPSec i HTTPS na całkowitą...
-
Numerical studies on the influence of selected construction features and road conditions on the performance of road cable barriers
PublicationCable barriers are commonly used on Polish roads, including motorways and local roads. Their main elements are pre-stressed wire ropes, which are usually anchored at two ends in concrete blocks buried in the soil. In this work numerical studies concerning the influence of selected construction features and parameters of the vehicle motion on the performance of cable barriers were performed. Numerical simulations are a useful tool...
-
Water resources security and management for sustainable communities
Publication -
Climate Changes in Southeastern Poland and Food Security
Publication -
Sectarianism as a Factor Shaping Persian Gulf Security
Publication -
Assessment of port facilities security in crisis management
PublicationZ punktu widzenia transportu międzynarodowego oraz przemysłowego charakteru systemu portowego, bezpieczeństwo obiektów portowych stanowi ważny element zarówno w zarządzaniu strategicznym portów morskich, jak również element ogólnej koncepcji zarządzania kryzysowego w ujęciu lokalnym, regionalnym, krajowym i międzynarodowym. W celu zapewnienia bezpieczeństwa portów morskich, muszą być prowadzone działania w celu przygotowania administracji...
-
Lab security improvement using RFID technologies
PublicationTechnologia RFID stanowi nie tylko technologię bliźniaczą w stosunku do kodów paskowych, ale posiada również dodatkowe cechy takie jak zdalna identyfikacja przy użyciu fal radiowych. Technologia ta staje się coraz bardziej dostępna i koszty jej wdrożenia są coraz mniejsze. W artykule przedstawiono wykorzystanie technologii RFID do ochrony sprzętu laboratoryjengo przed kradzieżą. Zawarto opis laboratorium wyposażonego w urządzenia...
-
Network-centric warfare: a strategy for homeland security
PublicationPojawienie się międzynarodowego terroryzmu skutkuje nowym podejście do identyfikacji potencjalnych zagrożeń dla bezpieczeństwa krajowego. Powstał strategiczny dylemat - jak zidentyfikować przeciwnika? Utworzono pojęcie asymetrycznego zagrożenia i, w konsekwencji, asymetrycznej wojny. Z dużym prawdopodobieństwem można założyć, że kolejne zagrożenia będą dotyczyć takich elementów krajowej infrastruktury, jak źródła energii, elektrownie,...
-
Web-based marine gis for littoral security
PublicationW artykule opisano koncepcję oraz przykładowe zastosowania systemu informacji geograficznej umożliwiającego zbieranie, przetwarzanie, integrowanie oraz wizualizację danych pochodzących z pomiarów bezpośrednich, obrazów lotniczych i satelitarnych oraz systemów hydroakustycznych.Przedstawiono przykłady zastosowania systemu w dziedzinie ochrony strefy przybrzeżnej takie, jak: -monitoring rozprzestrzeniania wylewu olejowego, -monitoring...
-
Hierarchical approach to security monitoring and risk evaluation
PublicationPrzedstawiono problemy bezpieczeństwa sieciowego z uwzględnieiem metod szacowania i oceny bezpieczeństwa w skali lokalnej i globalnej. Podano przykłady analizy 3 systemów wraz z wnioskami oraz sugestie dotyczące trendów przyszłościowych.
-
Functional safety and security management in critical systems
PublicationGłównym celem referatu jest przedstawienie wybranych kwestii zarządzania bezpieczeństwem i ochroną w systemach podwyższonego ryzyka i systemach krytycznych. Zarysowuje się kilka praktycznych problemów analizy bezpieczeństwa funkcjonalnego w celu podejmowania decyzji zgodnie z normami międzynarodowymi IEC 61508 i IEC 61511. Podkreśla się, że aspekty związane z ochroną powinny być starannie rozpatrzone zarówno w fazie projektowania,...
-
Security level estimation as a function of residual risks
PublicationArtykuł przedstawia sposób oceny poziomu bezpieczeństwa organizacji IT w oparciu o metodę oceny ryzyka. Opisane są podstawowe kroki wspomnianej metody, proponowane rozwiązania i zastosowania. Zaproponowano prosty sposób oceny bezpieczeństwa systemów informatycznych organizacji w oparciu o wielkość wyznaczoną na podstawie wyliczonego ryzyka rezydualnego tychże systemów.
-
Revenue of social security contributions (in PLN billion)
Open Research DataIn the period January-September 2020, the expenditure of the Social Insurance Fund amounted to PLN 197.1 billion, and the revenues from contributions and their derivatives - PLN 144.5 billion. As a result, the proceeds covered 73.3 percent. expenses. At that time, the fund received a subsidy from the budget in the amount of PLN 29.3 million.
-
Business continuity management framework for Industry 4.0 companies regarding dependability and security of the ICT and ICS/SCADA system
PublicationThis chapter addresses a business continuity management (BCM) framework for the Industry 4.0 companies including the organizational and technical solutions, regarding the dependability and security of the information and telecommunication technology (ICT), and the industrial control system (ICS) / supervisory control and data acquisition (SCADA) system. These technologies and systems play nowadays important roles in modern advanced...
-
Real-Time Facial Features Detection from Low Resolution Thermal Images with Deep Classification Models
PublicationDeep networks have already shown a spectacular success for object classification and detection for various applications from everyday use cases to advanced medical problems. The main advantage of the classification models over the detection models is less time and effort needed for dataset preparation, because classification networks do not require bounding box annotations, but labels at the image level only. Yet, after passing...
-
China-Russia Bilateral Security and Military Partnership in Changing World Order: Security Challenges for the United States of America in Asia and Beyond
Publication -
Significance of Dermoscopy in Association with Clinical Features in Differentiation of Basal Cell Carcinoma and Benign Trichoblastic Tumours
PublicationBackground: Although basal cell carcinoma (BCC) can, in the majority of cases, be diagnosed based on clinical and dermoscopic assessment, a potential overlap with benign adnexal skin tumours seems to exist, including trichoblastic tumours (TT). Methods: Retrospective analysis of clinical and dermoscopic features of benign TT and BCC cases was performed to develop a diagnostic algorithm with a potential utility in clinical practice....
-
Design centering of compact microwave components using response features and trust regions
PublicationFabrication tolerances, as well as uncertainties of other kinds, e.g., concerning material parameters or operating conditions, are detrimental to the performance of microwave circuits. Mitigating their impact requires accounting for possible parameter deviations already at the design stage. This involves optimization of appropriately defined statistical figures of merit such as yield. Alt-hough important, robust (or tolerance-aware)...
-
Dosimetric features of strontium orthosilicate (Sr2SiO4) doped with Eu2+
Publication -
Asymmetric features of short-term blood pressure variability
Publication -
MCORD - MPD Cosmic Ray Detector a new features
Publication -
Features of Nonlinear Sound Propagation in Vibrationally Excited Gases
PublicationWeakly nonlinear sound propagation in a gas where molecular vibrational relaxation takes place is studied. New equations which govern the sound in media where the irreversible relaxation may take place are derived and discussed. Their form depends on the regime of excitation of oscillatory degrees of freedom, equilibrium (reversible) or non-equilibrium (irreversible), and on the comparative frequency of the sound in relation to...
-
Persons' identification techniques based on characteristic features of face
PublicationIstnieje wiele metod identyfikacji osób opartych na ich cechach charakterystycznych. Metody te ograniczone są poprzez warunki, w których zdjęcie zostało wykonane jak na przykład oświetlenie. Autorzy artykułu proponują zastosowanie rozmytych reguł decyzyjnych oraz skonstruowanie miary podobieństwa na podstawie względnych odległości pomiędzy niezmienniczymi w czasie cechami charakterystycznymi twarzy do usunięcia ograniczeń istniejących...
-
Bimodal Emotion Recognition Based on Vocal and Facial Features
PublicationEmotion recognition is a crucial aspect of human communication, with applications in fields such as psychology, education, and healthcare. Identifying emotions accurately is challenging, as people use a variety of signals to express and perceive emotions. In this study, we address the problem of multimodal emotion recognition using both audio and video signals, to develop a robust and reliable system that can recognize emotions...
-
Ranking Speech Features for Their Usage in Singing Emotion Classification
PublicationThis paper aims to retrieve speech descriptors that may be useful for the classification of emotions in singing. For this purpose, Mel Frequency Cepstral Coefficients (MFCC) and selected Low-Level MPEG 7 descriptors were calculated based on the RAVDESS dataset. The database contains recordings of emotional speech and singing of professional actors presenting six different emotions. Employing the algorithm of Feature Selection based...
-
Testing a Variety of Features for Music Mood Recognition. Testowanie zestawu parametrów w celu rozpoznawania nastroju w muzyce
PublicationMusic collections are organized in a very different way depending on a target, number of songs or a distribution method, etc. One of the high-level feature, which can be useful and intuitive for listeners, is “mood”. Even if it seems to be the easiest way to describe music for people who are non-experts, it is very difficult to find the exact correlation between physical features and perceived impressions. The paper presents experiments...
-
Compact 4 × 4 butler matrix with non‐standard phase differences for IoT applications
PublicationButler matrices represent a popular class of feeding networks for antenna arrays. Large dimensions and the lack of flexibility in terms of achievable output phase difference make conventional Butler structures of limited use for modern communication devices. In this work, a compact planar 4 × 4 matrix with non-standard relative phase shifts of –30º, 150º, –120º, and 60º has been proposed. The structure is designed to operate at...
-
Time window based features extraction from temperature modulated gas sensors for prediction of ammonia concentration
PublicationElectronic gas recognition systems, in literature commonly referred as electronic noses, enable the recognition of a type and a concentration of various volatile compounds. Typical electronic gas-analyzing device consists of four main elements, namely, gas delivery subsystem, an array of gas sensors, data acquisition and power supply circuits and data analysis software. The commercially available metal-oxide TGS sensors are widely...
-
Janusz Górski prof. dr hab. inż.
People -
Application of BAN Network to Increase Security in Transport Systems
PublicationIn the article general characteristics of the BAN network with M2M communications are presented. These are networks that enable the implementation of wireless transmission of signals using special sensors located on the body or implanted subcutaneously. These sensors allow monitoring of different type life parameters of a human. In the next part of work there is proposed the implementation of BAN networks to transport systems as...