Filters
total: 4095
-
Catalog
- Publications 3110 available results
- Journals 264 available results
- Conferences 82 available results
- Publishing Houses 2 available results
- People 72 available results
- Projects 8 available results
- e-Learning Courses 52 available results
- Events 1 available results
- Open Research Data 504 available results
displaying 1000 best results Help
Search results for: PHYSICAL LAYER SECURITY
-
Characteristics of La0.8Sr0.2Ga0.8Mg0.2O3-delta -supported micro-tubular solid oxide fuel cells with bi-layer and tri-layer electrolytes
PublicationIn this study, La0.8Sr0.2Ga0.8Mg0.2O3−δ (LSGM)-supported micro tubular solid oxide fuel cells (T-SOFCs) with two different configurations, one containing an LSGM–Ce0.6La0.4O2−δ (LDC) bi-layer electrolyte (Cell A) and one containing an LDC–LSGM–LDC tri-layer electrolyte (Cell B), were fabricated using extrusion and dip-coating. After optimizing the paste formulation for extrusion, the flexural strength of the dense and uniform LSGM...
-
The Relation Between Art and Physical Activity in the Public Space of the Contemporary City
PublicationArt has always been and still is a mirror in which human activity is reflected. One of the basic human activities is physical activity, thanks to which humans are able to satisfy their needs, improve health and also function in society. Therefore, there are different relationships between physical activity and art. Both of them are present in the public space of cities and this aspect of connection is addressed in the article. The...
-
Objects classification based on their physical sizes for detection of events in camera images
PublicationIn the paper, a method of estimation of the physical sizes of the objects tracked in the video surveillance system, and a simple module for object classification based on the estimated physical sizes, are presented. The results of object classification are then used for automatic detection of various types of events in the camera image.
-
Security and knowledge management
PublicationOmówiono zagadnienia związane z problemami bezpieczeństwa w obszarach technologicznego wspomagania zarządzania wiedzą.
-
Security of Web Services
PublicationArtykuł przedstawia zagadnienia związane tematycznie z Web Services. W szczególności dotyczy problemów związanych z zapewniwniem poufności i integralności danych. Zdefiniowano model bezpieczeństwa Web Services integrujący trzy główne technologie: SOAP, UDDI, WSDL.
-
Activating Public Space: How to Promote Physical Activity in Urban Environment
PublicationPhysical activity is an essential component of a healthy lifestyle. The quality and equipment of urban public space plays an important role in promoting physical activity among people (residents, tourists). In order for recreation and sports activities to be undertaken willingly, in a safe and comprehensive manner, certain spatial conditions and requirements must be met. The distinctive feature of contemporary large cities is the...
-
Electrocatalytic Gas Sensor with Reference Layer
PublicationThis paper presents studies of gas sensors prepared in ceramic technology with Nasicon as a solid electrolyte. Sensors work in the voltammetric mode thus based on the excitation of a sensor with a periodic potential signal while current response is recorded. The main aim is to investigate a Bi8Nb2O17 reference layer influence on sensor properties. Sensors I-V characteristics in different concentration of nitrogen dioxide have been...
-
A model-based approach to analysis of authentication protocols.
PublicationW referacie przedstawiono zintegrowane podejście do analizy protokołów uwierzytelniania o nazwie Object-oriented Formal Authentication Protocol Security Analysis Framework (OF-APSAF). Podejście to jest zaprojektowane na bazie sprawdzonej metody formalnej CSP wraz z narzędziami ją wspierającymi: Casper oraz FDR. Jego integralną częścią jest półformalna zorientowana obiektowo technika modelowania protokołów, ich kontekstu oraz wymagań...
-
Health monitoring services based on off-the-shelf mobile devices
PublicationDevelopment of health monitoring systems usually involves usage of dedicated devices with provided guarantees in terms of their reliability. Those devices raise the cost of the whole system, because of which such platforms are limited only to specific areas and constrained number of users. Usage of off-the- shelf devices could lower the cost and bring those systems to the masses. The paper covers possible uses of common off-the-shelf...
-
Reconfigurable Antennas for Trustable Things
PublicationIn modern applications, the Internet of Things plays a significant role in increasing the productivity, effectiveness or safety and security of people and assets. Additionally, the reliability of Internet of Things components is crucial from the application point of view, where a resilient and low-latency network is needed. This can be achieved by utilizing reconfigurable antennas to enhance the capabilities of the wireless sensor...
-
ADAPTIVE PREDICTIONS OF THE EURO/ZŁOTY CURRENCY EXCHANGE RATE USING STATE SPACE WAVELET NETWORKS AND FORECAST COMBINATIONS
PublicationThe paper considers the forecasting of the euro/Polish złoty (EUR/PLN) spot exchange rate by applying state space wavelet network and econometric forecast combination models. Both prediction methods are applied to produce one-trading-day- ahead forecasts of the EUR/PLN exchange rate. The paper presents the general state space wavelet network and forecast combination models as well as their underlying principles. The state space...
-
A fair distribution scheme for joint fingerprinting and decryption methods= Sprawiedliwy schemat dystrybucji dla metod łącznego osadzania odcisku palca oraz deszyfracji
PublicationThe paper addresses the fairness of the security provided by digital fingerprinting methods. It was noted that the digital fingerprinting techniques are designed primarily to protect service providers against the actions of malicious users, while honest users remain vulnerable to acts of malicious providers. The paper describes the customer's rights problem and the unbinding problem, which also apply to joint fingerprinting and...
-
Electricity demand prediction by multi-agent system with history-based weighting
PublicationEnergy and load demand forecasting in short-horizons, over an interval ranging from one hour to one week, is crucial for on-line scheduling and security functions of power system. Many load forecasting methods have been developed in recent years which are usually complex solutions with many adjustable parameters. Best-matching models and their relevant parameters have to be determined in a search procedure. We propose a hybrid...
-
Integration and Visualization of the Results of Hydrodynamic Models in the Maritime Network-Centric GIS of Gulf of Gdansk
PublicationEnsuring of security in the coastal area makes on a seaside countries research in the field of infrastructure spatial information of environmental data. The paper presents the results of work on the construction of this infrastructure by integrating electronic navigational chart with ortophotomaps of coastal areas as well as numerical data from weather and hydrodynamic models. Paper focuses on a problems associated with creating...
-
Methodological issues of functional safety and reliability assessment of critical systems in industrial hazardous plants
PublicationThe aim of this article is to identify and discuss some methodological issues that are of interest among functional safety specialists and experts after publication of the second edition of international standards IEC 61508 and IEC 61511, including the design and implementing the safety-related functions of higher safety integrity levels and protection layers. The basic role of safety-related systems is to reduce effectively and...
-
Coastal zone monitoring using Sentinel-1 SAR polarymetry data
PublicationIn recent years the role of the surveillance and security of Polish boundaries has significantly increased. Polish coastal zone monitoring requires various approaches using various technological means in order to ensure the protection of Polish boundaries. In this paper, the authors discuss and present alternatives to underwater surveillance methods of coastal area analysis and monitoring using data retrieved from the newly developed...
-
Stradar - Multimedia Dispatcher and Teleinformation System for the Border Guard
PublicationSecurity of national borders requires utilization of multimedia surveillance systems automatically gathering, processing and sharing various data. The paper presents such a system developed for the Maritime Division of the Polish Border Guard within the STRADAR project. The system, apart from providing communication means, gathers data, such as map data from AIS, GPS and radar receivers, videos and photos from camera or audio from...
-
Functional safety with cybersecurity for the control and protection systems on example of the oil port infrastructure
PublicationSafety and cybersecurity aspects consist of two different group of functional requirements for the industrial control and protection systems in the oil port installation. It is the main reason why the analyses of safety and cybersecurity shouldn’t be integrated directly. These article presented some important issues of the functional safety analysis with regard to cybersecurity aspects in the oil seaport infrastructure. The proposed...
-
Deep Learning: A Case Study for Image Recognition Using Transfer Learning
PublicationDeep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...
-
Deep Learning
PublicationDeep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...
-
The Impact of Ergonomic Guiding Principles on the Formation of Modern Monumental Art
PublicationCommemoration of historic events is now a commonplace phenomenon both in culture and in academic research. The phenomenon is linked to an increase in the representation of the visualisation of the past in public sphere, which in turn leads to reformulation of monumental art. Modern monuments are often spatial forms consisting both of sculpture installation and bigger constructions. In case of these realisations, the designers,...
-
I, Robot: between angel and evil
PublicationThe boosting of most digital innovations within recent technology progress by artificial intelligence (AI) constitutes a growing topic of interest. Besides its technical aspects, increasing research activity may be observed in the domain of security challenges, and therefore of responsibility related to the controlled or hypothetically uncontrolled or autonomous emergence of AI solutions. Consequently, responsibility and ethics...
-
Physical testing methods of materials
e-Learning Courses -
On structural physical approximations and entanglement breaking maps
PublicationVery recently, a conjecture saying that the so-called structural physical approximations (SPAs) to optimal positive maps (optimal entanglement witnesses) give entanglement breaking (EB) maps (separable states) has been posed (Korbicz et al 2008 Phys. Rev. A 78 062105). The main purpose of this contribution is to explore this subject. First, we extend the set of entanglement witnesses supporting the conjecture. Then, we ask whether...
-
LABOR RESOURCE MANAGEMENT AT THE MACRO LEVEL AS SOCIAL SECURITY IN THE CONTEXT OF EUROPEAN INTEGRATION
Publication -
Ceramic composites for single-layer fuel cells
PublicationComposite materials consisting of acceptor doped lanthanum orthoniobate electrolyte phase (La0.98Ca0.02NbO4) and Li2O:NiO:ZnO semiconducting phase were synthesized. The precursor powder of La0.98Ca0.02NbO4 was prepared in nanocrystalline (mechanosynthesis) and microcrystalline (solid-state synthesis) form. The composite can be applied in a single-layer fuel cell, because of the presence of two phases acting as an anode and a cathode...
-
Statistical evaluation of physical and index properties of Vistula Marshlands deltaic soft soils
PublicationThis paper provides statistical evaluation of physical and index parameters of the Vistula Marshlands deltaic soft soils using three datasets. Soft soils from the Vistula Marshlands are grouped into the four categories: (1) silty/sandy loams, (2) organic clays, (3) organic silts and (4) peats. Variability of basic and derivative physical properties as well as Atterberg's limits and plasticity index is studied. It is found that...
-
Verification of the Parameterization Methods in the Context of Automatic Recognition of Sounds Related to Danger
PublicationW artykule opisano aplikację, która automatycznie wykrywa zdarzenia dźwiękowe takie jak: rozbita szyba, wystrzał, wybuch i krzyk. Opisany system składa się z bloku parametryzacji i klasyfikatora. W artykule dokonano porównania parametrów dedykowanych dla tego zastosowania oraz standardowych deskryptorów MPEG-7. Porównano też dwa klasyfikatory: Jeden oparty o Percetron (sieci neuronowe) i drugi oparty o Maszynę wektorów wspierających....
-
Electronic structure and physical properties of EuAuAs single crystal
Publication -
Synthesis and physical properties of the 10.6 K ferromagnet NdIr3
PublicationThe magnetic, transport, and thermodynamic properties of NdIr3 are reported. Its PuNi3-type crystal structure (space group R−3m), with lattice parameters a= 5.3262(1)Å and c=26.2218(3)Å, was confirmed by powder x-ray diffraction. Our measurements indicate that NdIr3 exhibits a previously unreported paramagnetic to ferromagnetic phase transition below TC=10.6 K(determined by using the Arrott plot). The magnetic susceptibility obeys...
-
Resolving conflicts in object tracking for automatic detection of events in video
PublicationW referacie przedstawiono algorytm rozwiązywania konfliktów w śledzeniu obiektów ruchomych. Proponowana metoda wykorzystuje predykcję stanu obiektu obliczaną przez filtry Kalmana oraz dopasowuje wykryte obiekty do struktur śledzących ich ruch na podstawie deskryptorów koloru i tekstury. Omówiono specyficzne sytuacje powodujące konflikty, takie jak rozdzielanie obiektów. Przedstawiono wyniki testów. Algorytm może być zastosowany...
-
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublicationAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
On the fast BSS transition algorithms in the IEEE 802.11r local area wireless networks
PublicationHandover performance is critical to support multimedia services that are becoming increasingly available over the wireless devices. The high transition delay can be unaccepted for such services or can be a source of disruption on the session. On the other side, IEEE 802.11 standard is being extended with new functionalities. Security and QoS features, included in recent IEEE 802.11-2007 standard, add management frames that are...
-
Realistic noise-tolerant randomness amplification using finite number of devices
PublicationRandomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...
-
Towards the value-based design of on-line services
PublicationThe paper identifies economic factors shaping customer bahaviour in on-line services in two interrelated dimensions; (1) economic needs and requirements, relevant to expected benefits and values perceived by customers; (2) technical components, allowing technical realization of on-line services. Technical components were cathegorized into four groups, creating so-called VIPR model: Visual, Interactive, Process and Relationship-relevant...
-
Trustworthy Applications of ML Algorithms in Medicine - Discussion and Preliminary Results for a Problem of Small Vessels Disease Diagnosis.
PublicationML algorithms are very effective tools for medical data analyzing, especially at image recognition. Although they cannot be considered as a stand-alone diagnostic tool, because it is a black-box, it can certainly be a medical support that minimize negative effect of human-factors. In high-risk domains, not only the correct diagnosis is important, but also the reasoning behind it. Therefore, it is important to focus on trustworthiness...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublicationFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
Hazardous material-related propagation of the effects of train accidents in the subgrade
PublicationA large part of the transport of hazardous materials is carried out by rail. Therefore, the security of these transports is becoming increasingly important. Every catastrophe involving dangerous materials has a negative impact on the participants of the incident and the surrounding environment, because its range is generally not local. It follows that in the event of a catastrophe, its effects should be minimized and remediation...
-
Noise in electrical double-layer capacitors (EDLCs)
PublicationWe present methods and problems of noise measurements in electrical double-layer capacitors (EDLC). Detailed noise equivalent electronic circuit is considered, and two possible ways of observations of random processes generated in the EDLCs structures are studied. We conclude that noise is a useful tool for characterization of the EDLC structures and their state-of-health, as in other materials and electronic devices. Eventual,...
-
Acoustic heating produced in the boundary layer
Publication: Instantaneous acoustic heating of a viscous fluid flow in a boundary layer is the subject of investigation. The governing equation of acoustic heating is derived by means of a special linear combination of conservation equations in the differential form, which reduces all acoustic terms in the linear part of the final equation but preserves terms belonging to the thermal mode. The procedure of decomposition is valid in a weakly...
-
Visual content representation and retrieval for Cognitive Cyber Physical Systems
PublicationCognitive Cyber Physical Systems have gained significant attention from academia and industry during the past few decade. One of the main reasons behind this interest is the potential of such technologies to revolutionize human life since they intend to work robustly under complex visual scenes, which environmental conditions may vary, adapting to a comprehensive range of unforeseen changes, and exhibiting prospective behavior...
-
Plant Biotechnology in Food Security
Publication -
The EU's Cyber Security Strategy
Publication -
On some aspects of maritime security
PublicationZostały przedstawione wybrane zagadnienia dotyczące ochrony żeglugi, w tym opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS, Statkowy System Alarmowania (SSAS) oraz system AIS i System Identyfikacji i Śledzenia Dalekiego Zasięgu (LRIT). Przedstawiono również znaczenie nowoczesnej telekomunikacji dla potrze sprawnej ochrony żeglugi na morzach i oceanach
-
Quantum security and theory of decoherence
PublicationWe sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...
-
Structural and dynamic properties of water within the solvation layer around various conformations of the glycine-based polypeptide
PublicationSeveral conformations of the solvated glycine-based polypeptides were investigated using molecular dynamics simulations. Some properties of water in the neighbouring space around these molecules were investigated. It was found, that water forms a well-defined layer - the first solvation shell - around the peptide molecule, and thickness of this layer is independent of the peptide structure, and it equals to approximately 0.28 nm....
-
Method of identification of the slide tribological system top layer condition by assessment of the t-02 four-ball tester friction node operation
Publicationa method is proposed of the assessment of t-02 four-ball tester friction node operation during extreme unit loads on the tribological system for identification of the top layer condition in that system lubricated with the tested lubricating oil. by identification of the friction node with a thermodynamic system, that operation is treated as an energy generating process of the created servo-layer structure. the friction node operation...
-
Fracture Energy of Bonded Joints with 2D Elastic Adhesive Layer
PublicationWhen bonded joint is subjected to mode I fracture loading, the adhesive joints analytical solutions treats the adhesive layer, usually, as not existing or 1D Hooke elastic layer. In the case of 1D elastic layer, represented as Hookes spring element, is acting, only, in direction contrary to the applied load. Basing on the information yielded from sensitive laser profilometry technique, where deflections of bonded part of the joint...
-
Structural and Dynamic Properties of Water within the Solvation Layer around Various Conformations of the Glycine-based Polypeptide
PublicationSeveral conformations of the solvated glycine-based polypeptides were investigated using molecular dynamics simulations. Some properties of water in the neighboring space around these molecules were investigated. It was found that water forms a well-defined layer—the first solvation shell—around the peptide molecule, and thickness of this layer is independent of the peptide structure and is equal to approximately 0.28 nm. Within...
-
Investigations of Titanium Implants Covered with Hydroxyapatite Layer
PublicationTo reduce unfavorable phenomena occurring after introducing an implant into human body various modifications of the surface are suggested. Such modifications may have significant impact on biocompatibility of metallic materials. The titanium and it's alloys are commonly used for joint and dental implants due to their high endurance, low plasticity modulus, good corrosion resistance as well as biocompatibility. Special attention...