Search results for: SUPERVISORY OR SECURITY SYSTEMS - Bridge of Knowledge

Search

Search results for: SUPERVISORY OR SECURITY SYSTEMS

Search results for: SUPERVISORY OR SECURITY SYSTEMS

  • Future research directions in design of reliable communication systems

    Publication
    • J. Rak
    • M. Pickavet
    • K. S. Trivedi
    • J. A. Lopez
    • A. M. C. A. Koster
    • J. P. Sterbenz
    • E. Çetinkaya
    • T. Gomes
    • M. Gunkel
    • K. Walkowiak
    • D. Staessens

    - TELECOMMUNICATION SYSTEMS - Year 2015

    In this position paper on reliable networks, we discuss new trends in the design of reliable communication systems. We focus on a wide range of research directions including protection against software failures as well as failures of communication systems equipment. In particular, we outline future research trends in software failure mitigation, reliability of wireless communications, robust optimization and network design, multilevel...

    Full text available to download

  • Smart Knowledge Engineering for Cognitive Systems: A Brief Overview

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2022

    Cognition in computer sciences refers to the ability of a system to learn at scale, reason with purpose, and naturally interact with humans and other smart systems, such as humans do. To enhance intelligence, as well as to introduce cognitive functions into machines, recent studies have brought humans into the loop, turning the system into a human–AI hybrid. To effectively integrate and manipulate hybrid knowledge, suitable technologies...

    Full text available to download

  • Computer controlled systems - 2022/2023

    e-Learning Courses
    • P. Raczyński

    materiały wspierające wykład na studiach II stopnia na kierunku ACR pod tytułem komputerowe systemy automatyki 1. Computer system – controlled plant interfacing technique; simple interfacing and with both side acknowledgement; ideas, algorithms, acknowledge passing. 2. Methods of acknowledgement passing: software checking and passing, using interrupt techniques, using readiness checking (ready – wait lines). The best solution...

  • Cognitive Systems, Concepts, Processes, and Techniques for the Age of Industry 4.0

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2021

    The aim of this Guest Edition of Cybernetics and Systems is to present a wide-ranging scale of concepts and processes being currently researched, developed, and evaluated in real life settings in anticipation of incoming Industry 4.0 era. With the fourth industrial revolution expectation, the broad spectrum of cognitive approaches have emerged as an attempt to mimic and augment, in some way, human intelligence. Intelligence, in...

    Full text available to download

  • INTEGRATED FUNCTIONAL SAFETY AND CYBERSECURITY ANALYSIS METHOD FOR SMART MANUFACTURING SYSTEMS

    Publication

    - TASK Quarterly - Year 2019

    This article addresses integrated functional safety and cybersecurity analysis with regard to: the generic functional safety standard IEC 61508 and the cyber security standard IEC 62443 concerning an industrial automation and control system (IACS). The objective is to mitigate the vulnerability of information technology (IT) and operational technology (OT) systems, and reduce relevant risks taking into account a set of fundamental...

    Full text available to download

  • Subharmonic solutions for a class of Lagrangian systems

    We prove that second order Hamiltonian systems with a potential of class C1, periodic in time and superquadratic at infinity with respect to the space variable have subharmonic solutions. Our intention is to generalise a result on subharmonics for Hamiltonian systems with a potential satisfying the global Ambrosetti-Rabinowitz condition from [P. H. Rabinowitz, Proc. Roy. Soc. Edinburgh Sect. A, 114 (1990), 33-38]. Indeed, we weaken...

    Full text available to download

  • Safety-Critical Systems 2023

    e-Learning Courses
    • A. Wardziński

    Safety-Critical Systems / Bezpieczeństwo systemówKierunek Informatyka, studia II stopniaProwadzący: Andrzej WardzińskiWykład: Poniedziałek 15:15 EA 07 (od 27 lutego 2023)Projekt w drugiej połowie semestruKod dostępu do przedmiotu w eNauczanie będzie przekazany podczas pierwszego wykładu

  • COMPUTERS & SECURITY

    Journals

    ISSN: 0167-4048 , eISSN: 1872-6208

  • Health Security

    Journals

    ISSN: 2326-5094 , eISSN: 2326-5108

  • Food Security

    Journals

    ISSN: 1876-4517 , eISSN: 1876-4525

  • African Security

    Journals

    ISSN: 1939-2206 , eISSN: 1939-2214

  • Democracy & Security

    Journals

    ISSN: 1741-9166 , eISSN: 1555-5860

  • European Security

    Journals

    ISSN: 0966-2839 , eISSN: 1746-1545

  • Asian Security

    Journals

    ISSN: 1479-9855

  • Security Challenges

    Journals

    ISSN: 1833-1459

  • INTERNATIONAL SECURITY

    Journals

    ISSN: 0162-2889 , eISSN: 1531-4804

  • Security Forum

    Journals

    ISSN: 2544-1809

  • Security and Privacy

    Journals

    ISSN: 2475-6725

  • Water Security

    Journals

    eISSN: 2468-3124

  • SECURITY STUDIES

    Journals

    ISSN: 0963-6412 , eISSN: 1556-1852

  • Security Journal

    Journals

    ISSN: 0955-1662 , eISSN: 1743-4645

  • SECURITY DIALOGUE

    Journals

    ISSN: 0967-0106 , eISSN: 1460-3640

  • Safety-Critical Systems 2023

    e-Learning Courses
    • A. Wardziński

    Safety-Critical Systems / Bezpieczeństwo systemówKierunek Informatyka, studia II stopnia Prowadzący: Andrzej Wardziński Wykład: Poniedziałek 15:15 EA 07 (od 27 lutego 2023) Projekt w drugiej połowie semestru Kod dostępu do przedmiotu w eNauczanie będzie przekazany podczas pierwszego wykładu

  • The modelling method of discrete-continuous systems

    Publication

    The paper introduces a method of discrete-continuous systems modelling. In the proposed method a three-dimensional system is divided into finite elements in only two directions, with the third direction remaining continuous. The thus obtained discrete-continuous model is described by a set of partial differential equations. General difference equations of discrete system are obtained using the rigid finite element method. The limit...

    Full text available to download

  • Measurements and Measurement Systems [2021/22]

    e-Learning Courses
    • A. Golijanek-Jędrzejczyk
    • A. Dzwonkowski
    • M. Śliwiński
    • M. Wołoszyn

    The aim of the course is to introduce theoretical and practical students with basic and advanced methods of measurement of various measured quantity and the design and function of the measurement systems.

  • Systems of boundary value problems of advanced differential equations

    This paper considers the existence of extremal solutions to systems of advanced differential equations with corresponding nonlinear boundary conditions. The monotone iterative method is applied to obtain the existence results. An example is provided for illustration.

    Full text available to download

  • Performance and Security Testing of Distributed Applications Working in Public/Private IPSec and HTTPS Environments

    Publication

    - Year 2009

    W pracy przedstawiono zagadnienie testowania wydajności (ang. Performance) i bezpieczeństwa (ang. Security) aplikacji rozproszonych działających w sieciach publiczno-prywatnych stworzonych przy wykorzystaniu technologii IPSec i HTTPS. Dwa podejścia do architektury oprogramowania tych aplikacji zostały omówione: Request/Response oraz Publish/Subscribe. Analiza zawiera przedstawienie wpływu technologii IPSec i HTTPS na całkowitą...

  • Network-centric warfare: a strategy for homeland security

    Publication

    - Year 2006

    Pojawienie się międzynarodowego terroryzmu skutkuje nowym podejście do identyfikacji potencjalnych zagrożeń dla bezpieczeństwa krajowego. Powstał strategiczny dylemat - jak zidentyfikować przeciwnika? Utworzono pojęcie asymetrycznego zagrożenia i, w konsekwencji, asymetrycznej wojny. Z dużym prawdopodobieństwem można założyć, że kolejne zagrożenia będą dotyczyć takich elementów krajowej infrastruktury, jak źródła energii, elektrownie,...

  • Web-based marine gis for littoral security

    W artykule opisano koncepcję oraz przykładowe zastosowania systemu informacji geograficznej umożliwiającego zbieranie, przetwarzanie, integrowanie oraz wizualizację danych pochodzących z pomiarów bezpośrednich, obrazów lotniczych i satelitarnych oraz systemów hydroakustycznych.Przedstawiono przykłady zastosowania systemu w dziedzinie ochrony strefy przybrzeżnej takie, jak: -monitoring rozprzestrzeniania wylewu olejowego, -monitoring...

  • Lab security improvement using RFID technologies

    Publication

    - Year 2006

    Technologia RFID stanowi nie tylko technologię bliźniaczą w stosunku do kodów paskowych, ale posiada również dodatkowe cechy takie jak zdalna identyfikacja przy użyciu fal radiowych. Technologia ta staje się coraz bardziej dostępna i koszty jej wdrożenia są coraz mniejsze. W artykule przedstawiono wykorzystanie technologii RFID do ochrony sprzętu laboratoryjengo przed kradzieżą. Zawarto opis laboratorium wyposażonego w urządzenia...

  • Sectarianism as a Factor Shaping Persian Gulf Security

    Publication

    - International Studies - Year 2015

    Full text to download in external service

  • Assessment of port facilities security in crisis management

    Z punktu widzenia transportu międzynarodowego oraz przemysłowego charakteru systemu portowego, bezpieczeństwo obiektów portowych stanowi ważny element zarówno w zarządzaniu strategicznym portów morskich, jak również element ogólnej koncepcji zarządzania kryzysowego w ujęciu lokalnym, regionalnym, krajowym i międzynarodowym. W celu zapewnienia bezpieczeństwa portów morskich, muszą być prowadzone działania w celu przygotowania administracji...

  • Hierarchical approach to security monitoring and risk evaluation

    Publication

    - Year 2005

    Przedstawiono problemy bezpieczeństwa sieciowego z uwzględnieiem metod szacowania i oceny bezpieczeństwa w skali lokalnej i globalnej. Podano przykłady analizy 3 systemów wraz z wnioskami oraz sugestie dotyczące trendów przyszłościowych.

  • Security level estimation as a function of residual risks

    Publication

    - Year 2006

    Artykuł przedstawia sposób oceny poziomu bezpieczeństwa organizacji IT w oparciu o metodę oceny ryzyka. Opisane są podstawowe kroki wspomnianej metody, proponowane rozwiązania i zastosowania. Zaproponowano prosty sposób oceny bezpieczeństwa systemów informatycznych organizacji w oparciu o wielkość wyznaczoną na podstawie wyliczonego ryzyka rezydualnego tychże systemów.

  • Water resources security and management for sustainable communities

    Publication

    - Year 2021

    Full text to download in external service

  • Climate Changes in Southeastern Poland and Food Security

    Publication
    • B. Sawicka
    • P. Barbaś
    • P. Pszczółkowski
    • D. Skiba
    • F. Yeganehpoor
    • B. Krochmal-Marczak

    - Climate - Year 2022

    Full text to download in external service

  • Wireless Systems of Threats Monitoring

    The concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...

  • Stream Reasoning to Improve Decision-Making in Cognitive Systems

    Publication
    • C. S. de Oliveira
    • F. Giustozzi
    • C. Zanni-Merk
    • C. Sanin
    • E. Szczerbicki

    - CYBERNETICS AND SYSTEMS - Year 2020

    ABSTRACT Cognitive Vision Systems have gained a lot of interest from industry and academia recently, due to their potential to revolutionize human life as they are designed to work under complex scenes, adapting to a range of unforeseen situations, changing accordingly to new scenarios and exhibiting prospective behavior. The combination of these properties aims to mimic the human capabilities and create more intelligent and efficient...

    Full text available to download

  • Revenue of social security contributions (in PLN billion)

    Open Research Data
    open access

    In the period January-September 2020, the expenditure of the Social Insurance Fund amounted to PLN 197.1 billion, and the revenues from contributions and their derivatives - PLN 144.5 billion. As a result, the proceeds covered 73.3 percent. expenses. At that time, the fund received a subsidy from the budget in the amount of PLN 29.3 million.

  • Computational collective intelligence for enterprise information systems

    Publication

    - Enterprise Information Systems - Year 2019

    Collective intelligence is most often understood as a kind of intelligence which arises on the basis of a group (collective) of autonomous unites (people, systems) which is taskoriented. There are two important aspects of an intelligent collective: The cooperation aspect and the competition aspect (Levy 1997). The first of them means the possibility for integrating the decisions made by the collective members for creating the decision of...

    Full text to download in external service

  • China-Russia Bilateral Security and Military Partnership in Changing World Order: Security Challenges for the United States of America in Asia and Beyond

    Publication
    • M. Bharti

    - Historia i Polityka - Year 2022

    Full text to download in external service

  • Annual Review of Control Robotics and Autonomous Systems

    Journals

    eISSN: 2573-5144

  • Rule-Based Model for Selecting Integration Technologies for Smart Cities Systems

    Publication

    The aim of this article is to present the stages of development for an information technology integration model for the design of systems for smart cities. The Introduction explains the need for integration technologies and presents a model for selecting integration technologies and the conditions for its use in designing smart cities systems. Then two verification stages of the presented model are discussed. In the first stage,...

    Full text available to download

  • Potential Application of Solar Energy Systems for Electrified Urban Transportation Systems

    Publication

    The paper presents a novel approach toward the use of solar energy systems in public transportation. The concept of energy generation in PV systems for supplying a trolleybus transportation system is proposed for the city of Gdynia (Poland). The suggested way of energy production allows reducing the environmental harm impact of the municipal transportation system. Moreover, the proposed way of green energy use can be a more profitable...

    Full text available to download

  • Andrzej Czyżewski prof. dr hab. inż.

    Prof. zw. dr hab. inż. Andrzej Czyżewski jest absolwentem Wydziału Elektroniki PG (studia magisterskie ukończył w 1982 r.). Pracę doktorską na temat związany z dźwiękiem cyfrowym obronił z wyróżnieniem na Wydziale Elektroniki PG w roku 1987. W 1992 r. przedstawił rozprawę habilitacyjną pt.: „Cyfrowe operacje na sygnałach fonicznych”. Jego kolokwium habilitacyjne zostało przyjęte jednomyślnie w czerwcu 1992 r. w Akademii Górniczo-Hutniczej...

  • Real-time Operating Systems - Seminar 2023/4

    e-Learning Courses
    • M. Pazio

    Page to support seminar clases of Real-time Operating Systems

  • A CONTEXT IN RECOMMENDER SYSTEMS

    Publication

    - Year 2016

    Recommender systems aim to propose potentially interesting items to a user based on his preferences or previous interaction with the system. In the last decade, researcher found out that known recommendation techniques are not sufficient to predict user decisions. It has been noticed that user preferences strongly depend on the context in which he currently is. This raises new challenges for the researchers such as how to obtain...

  • Periodic Solutions of Generalized Lagrangian Systems with Small Perturbations

    In this paper we study the generalized Lagrangian system with a small perturbation. We assume the main term in the system to have a maximum, but do not suppose any condition for perturbation term. Then we prove the existence of a periodic solution via Ekeland’s principle. Moreover, we prove a convergence theorem for periodic solutions of perturbed systems.

    Full text available to download

  • From Knowledge based Vision Systems to Cognitive Vision Systems: A Review

    Publication

    - Year 2018

    Computer vision research and applications have their origins in 1960s. Limitations in computational resources inherent of that time, among other reasons, caused research to move away from artificial intelligence and generic recognition goals to accomplish simple tasks for constrained scenarios. In the past decades, the development in machine learning techniques has contributed to noteworthy progress in vision systems. However,...

    Full text available to download

  • Context-Aware Indexing and Retrieval for Cognitive Systems Using SOEKS and DDNA

    Publication

    - Advances in Intelligent Systems and Computing - Year 2019

    Visual content searching, browsing and retrieval tools have been a focus area of interest as they are required by systems from many different domains. Context-based, Content-Based, and Semantic-based are different approaches utilized for indexing/retrieving, but have their drawbacks when applied to systems that aim to mimic the human capabilities. Such systems, also known as Cognitive Systems, are still limited in terms of processing...

    Full text available to download