Filters
total: 2588
-
Catalog
- Publications 1723 available results
- Journals 182 available results
- Conferences 95 available results
- Publishing Houses 2 available results
- People 275 available results
- Projects 13 available results
- Laboratories 1 available results
- Research Teams 1 available results
- e-Learning Courses 116 available results
- Events 2 available results
- Open Research Data 178 available results
displaying 1000 best results Help
Search results for: RESIDENTIAL%20ARCHITECTURE,%20SECURITY,%20SENSE%20OF%20FREEDOM,%20PROXIMAL
-
Evaluation of Six Degrees of Freedom 3D Audio Orchestra Recording and Playback using multi-point Ambisonic interpolation
PublicationThis paper describes a strategy for recording sound and enabling six-degrees-of-freedom playback, making use of multiple simultaneous and synchronized Higher Order Ambisonics (HOA) recordings. Such a strategy enables users to navigate in a simulated 3D space and listen to the six-degrees-of-freedom recordings from different perspectives. For the evaluation of the proposed approach, an Unreal Engine-based navigable 3D audiovisual...
-
Integrated monitoring, control and security of Critical Infrastructure Systems
PublicationModern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...
-
Security Evaluation of IT Systems Underlying Critical Networked Infrastructures
PublicationCritical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...
-
Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures
PublicationIn the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...
-
Cryptographic Protocols' Performance and Network Layer Security of RSMAD
PublicationW artykule omówiono architekturę bezpieczeństwa warstwy sieciowej Radiowego Systemu Monitorowania i Akwizycji Danych z urządzeń fotoradarowych (w skrócie RSMAD). Bezpieczeństwo w warstwie sieciowej tego systemu jest zapewniane przede wszystkim dzięki wykorzystaniu Virtual Private Network (w skrócie VPN). W tym celu zaimplementowano dwa protokoły IPsec i L2TP.Zastosowane mechanizmy ochrony danych, w tym typy i parametry VPNów zostały...
-
Software modules and application layer's security structure of RSMAD
PublicationThe paper discusses the software modules of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The structure of the application layer of the system has also been analysed in details, including: purpose, structure and principles of operation of software modules constituting this system. In addition, the paper presents and discusses the structure of security of application layer...
-
Approach to security assessment of critical infrastructures' information systems
PublicationThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Managing the security vulnerabilities of critical systems and hazardous plants
PublicationRozdział poświęcono aktualnym problemom zarządzania ochroną obiektów podwyższonego ryzyka jako ważnych systemów infrastruktury krytycznej. Zarządzanie odpornością na ataki takich obiektów jest oparte na ocenach ryzyka. Podkreśla się, że występują ważne instalacje i systemy wymagające specjalnej uwagi i zabezpieczeń, szczególnie systemy kontroli dostępu do sterowni i urządzeń komunikacji. Opisuje się przykładowe technologie ochrony....
-
Uncertainty assessment in the safety and security oriented risk analyses
PublicationW artykule przedstawiono uwzględnienie oceny niepewności w procesie związanym z analizą ryzyka i analizą bezpieczeństwa oraz ochroną informacji. Przedstawiona została koncepcja oceny bezpieczeństwa i zarządzania ryzykiem z uwzględnieniem analizy warstw zabezpieczeń LOPA. W artykule nakreślono wyzwania związane z integracją podejścia oceny bezpieczeństwa (safety) i ochrony informacji (security) w projektowaniu systemów zabezpieczeń...
-
Safety and security governance problems of critical systems and infrastructures
PublicationW artykule przedstawiono kilka problemów związanych z zarządzaniem bezpieczeństwem i ochroną informacji w systemach i infrastrukturach krytycznych.Bardzo ważne jest zidentyfikowanie i scharakteryzowanie infrastruktury krytycznej. Przedstawiono nowe wyzwania związane z łączeniem podejścia bezpieczeństwa i ochrony informacji w procesie podejmowania decyzji
-
Supporting Compliance with Security Standards by Trust Case Templates
PublicationTrust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....
-
Methodological issues of security vulnerability analysis and risk assessment
PublicationArtykuł przedstawia wybrane aspekty metodyczne związane z zarządzaniem bezpieczeństwem i ochroną instalacji podwyższonego ryzyka. Podkreślono, że występują instalacje podwyższonego ryzyka, które wymagają specjalnej uwagi w zarządzaniu bezpieczeństwem. Zaproponowano metodykę opartą na wiedzy do zintegrowanej analizy LOPA (warstw zabezpieczeń) i ROPA (pierścieni zabezpieczeń). Nadrzędnym celem jest opracowanie metod i narzędzi wspomagających...
-
Selected Methods For Increases Reliability The Of Electronic Systems Security
Publication -
Functional safety and security assessment of the control and protection systems
PublicationW artykule zostały poruszone kluczowe aspekty integracji podejścia bezpieczeństwa funkcjonalnego ''safety'' i ochrony informacji ''security'' w rozproszonych systemach sterowania i zabezpieczeniowych. Próba integracji zagadnień ''safety'' @ ''security'' została zilustrowana na przykładzie systemu monitoringu i zabezpieczeń pracującego w obiekcie podwyższonego ryzyka.
-
Application of BAN Network to Increase Security in Transport Systems
PublicationIn the article general characteristics of the BAN network with M2M communications are presented. These are networks that enable the implementation of wireless transmission of signals using special sensors located on the body or implanted subcutaneously. These sensors allow monitoring of different type life parameters of a human. In the next part of work there is proposed the implementation of BAN networks to transport systems as...
-
Determining and verifying the safety integrity level with security aspects
PublicationSafety and security aspects consist of two different group of functional requirements for the control and protection systems. It is the reason why the analyses of safety and security shouldnt be integrated directly. The paper proposes extension of the currently used methods of functional safety analyses. It can be done with inclusion of the level of information security assigned to the technical system. The article addresses some...
-
Anti-theft lab security system based on RFID
PublicationThe aim of the project is to design and create an electronic system, which can be used to protect laboratory equipment against theft. The main task of the system is to warn a person responsible for the facilities about any attempts made to steal equipment from a laboratory. In a case of an alarm situation, the system emits a sound signal. The concept of the anti-theft security system based on RFID was developed on the basis of...
-
User Trust Levels and Their Impact on System Security and Usability
PublicationA multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.
-
Is Artificial Intelligence Ready to Assess an Enterprise’s Financial Security?
PublicationThis study contributes to the literature on financial security by highlighting the relevance of the perceptions and resulting professional judgment of stakeholders. Assessing a company’s financial security using only economic indicators—as suggested in the existing literature—would be inaccurate when undertaking a comprehensive study of financial security. Specifically, indices and indicators based on financial or managerial reporting...
-
Security-oriented agile approach with AgileSafe and OWASP ASVS
PublicationIn this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these...
-
Adapting Agile Practices to Security Context – Practitioners’ Perspective
PublicationIn this paper we explore the problem of introducing agile practices to projects dealing with systems with high security requirements. We also propose an approach based on AgileSafe method and OWASP ASVS guidelines, that could support such introduction. What is more, we present the results of two surveys aimed at analyzing IT practitioners’ views on applying agile methods to security reliant systems as well as evaluating the set...
-
ASSESSMENT OF FINANCIAL SECURITY OF AN ENTERPRISE ON THE BASIS OF BEHAVIORAL ECONOMICS
PublicationThe article substantiates that the level of company’s financial security depends not so much on the indicators of its activity, but on its perception of decision-makers and other stakeholders. At the same time, this perception is formed due to the continuous participation of the stakeholder in operations, constant monitoring of financial indicators, the study of current approaches to enterprise management, changes in the environment,...
-
Challenges in security and safety management of critical systems and infrastructures
PublicationReferat poświęcono aktualnym problemom zarządzania bezpieczeństwem systemów i infrastruktur krytycznych. Infrastruktury krytyczne szereguje się z uwzględnieniem kilku kryteriów. Zarysowuje się problematykę zarządzania podatnością obiektów podwyższonego ryzyka na działania z zewnątrz oraz zagadnienie analizy ryzyka na przykładzie systemu elektroenergetycznego. W końcowej części referatu opisuje się nowe wyzwania związane z zarządzaniem...
-
Chora: Intervals in the Philosophy of Architecture
Journals -
Journal of Research in Architecture and Planning
Journals -
Interiors-Design Architecture Culture
Journals -
ArcHistoR-Architecture History Restoration
Journals -
IEEE Computer Architecture Letters
Journals -
International Journal of Islamic Architecture
Journals -
METU Journal of the Faculty of Architecture
Journals -
Journal of Digital Landscape Architecture
Journals -
Journal of Architecture and Civil Engineering
Journals -
International Scientific Yoga Journal SENSE
Journals -
Farrow structure implementation of fractional delay filter optimal in Chebyshev sense
PublicationW pracy omówiono problematykę implementacji filtrów ułamkowych opóźniających o zmiennym opóźnieniu w oparciu o strukturę Farrowa. Podejście to polega na obliczeniu próbek nowej odpowiedzi impulsowej filtru dla każdego wymaganego opóźnienia w opraciu o wielomiany o współczynnikach niezależnych od opóźnienia. Prowadzi to do znacznego zmniejszenia kosztów numerycznych implementacji w zastosowaniach wymagających częstej zmiany opóźnienia...
-
Emotional Costs, Social Influence, Sense of Coherence, and Coping in the Situation of Reemployment
Publication -
Testing the Wide-Sense Stationarity of Bandpass Signals for Underwater Acoustic Communications
PublicationThe Underwater Acoustic Communication (UAC) systems work in communication channels characterized by a large variety of multipath propagation conditions that can additionally change over time. Designing a reliable communication system requires knowledge of the transmission parameters of the channel. There is a need for the development of adaptive signaling schemes that would dynamically optimize the signal parameters of the physical...
-
Four Degree-of-Freedom Hydrodynamic Maneuvering Model of a Small Azipod-Actuated Ship With Application to Onboard Decision Support Systems
PublicationThe main contribution of this paper is a numerical ship motion model of NTNU’s research vessel Gunnerus, capturing the surge, sway, roll, and yaw dynamics when sailing in uniform and steady currents. The model utilizes a crossflow drag formulation for the transverse viscous loads, and it includes a nonlinear formulation for the propulsion and steering loads provided by two azipod thrusters. A wide range of experimental data obtained...
-
Loosely-Tied Distributed Architecture for Highly Scalable E-Learning System
PublicationVast majority of modern e-learning products are based on client-server architecture and utilization of web-based technologies (WBT). Such approach permits easy creation of e-learning systems that do not require a complex, operating system dependant client software. Unfortunately there are also drawbacks of such solution. Because of the majority of mechanisms are located on the server, its usage levels trend to build up quickly...
-
Architecture of contemporary museum as the art of transmission of material and spiritual cultural values
Publication -
Analysis of impact of audio modifications on the robustness of watermark for non-blind architecture
PublicationThe aim of this paper is to assess the robustness of the non-blind audio content watermarking scheme proposed by the authors. The authors present the architecture of the designed system along with the employed workflows for embedding and extracting the watermark followed by the implementation phase description and the analysis of the experimental results. Some possible attack simulations on the embedded watermarks are reviewed,...
-
The experience of movement in the built form and space: A framework for movement evaluation in architecture
Publication“Movement in architecture” is an organized system of various types of movements stimulated by specific architectural elements. This research was conducted through a qualitative-analytical method and empirical and bibliographical research methods with the aim to categorize different types of movements based on the explorer and observer relationships with the built space and form. So far, most of the related studies have focused...
-
Moving Towards Competence in Teaching Architecture: The Relationship of Research and Design in Academia
PublicationArchitecture is truly a profession of public trust requiring special care at all stages in academic education. European educational reforms initiated by the 1999 Bologna Process affected architecture education, and shifted the role of research. The number of doctoral programs increased, so the involvement of PhD students in teaching also expanded. This study aims to identify how these changes affect quality in architecture education....
-
Theory and implementation of a virtualisation level Future Internet defence in depth architecture
PublicationAn EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...
-
Hybrid DUMBRA: an efficient QoS routing algorithm for networks with DiffServ architecture
PublicationDynamic routing is very important issue of current packet networks. It may support the QoS and help utilize available network resources. Unfortunately current routing mechanisms are not sufficient to fully support QoS. Although many research has been done in this area no generic QoS routing algorithm has been proposed that could be used across all network structures. Existing QoS routing algorithms are either dedicated to limited...
-
THE INFLUENCE OF THE EVOLUTION OF DAYLIGHTING SYSTEMS OF EXHIBITION SPACE ON THE ARCHITECTURE OF THE MUSEUM'S BUILDING
PublicationThe paper deals with the architecture of museums as dependent on the ways of lighting the exhibition space. The work focuses on the analysis of the influence of daylighting systems on shaping the museum's architecture in the period from the Renaissance to modern times. The method of work includes studying literature and the case study of the objects characteristic of the presented concepts and lighting systems. The results of the...
-
Frontier education for a sustainable future - speculative design in architecture as a transdisciplinary experiment
PublicationIn this article, the authors propose the term frontier education referring to the well-established notion of frontier research - one, that through opening unexpected transdisciplinary perspectives, may offer new insights and create a fertile ground for new discoveries and ground-breaking concepts. In answer to the question of how to get rid of normative thinking and extend architectural experimentations, a speculative design architectural...
-
The potential of computational methods for the categorization of architectural objects on the example of media architecture
PublicationThe paper presents an example of the categorization of architectural objects and assessment of the characteristics of urban space, based on the analysis of specific features of architectural objects and urban landscape. The conducted analysis refers to media architecture and is presented in the complex context of the development of media solutions. The field of influence of IT on architecture is also stressed, both on the architect’s...
-
Architecture at the Sites of the Former Nazi Concentration Camps. Functional Changeability of Commemoration
PublicationThe monograph presents a comprehensive analysis of the architectural structures created in the former concentration camps in Europe under the SS Main Economy and Administration Office. It delves into the history of memorial site creation in these areas, emphasizing the unique characteristics of monuments dedicated to the victims of terror. Additionally, the study covers the post-war architectural transformations in these areas,...
-
CHANGES TAKING PLACE IN THE KINETIC ARCHITECTURE OVER THE 20TH AND 21ST CENTURIES
PublicationKinematics has accompanied architecture from its beginning and is strongly associated with its evolution. Over the centuries, it has changed form and function. However, its rank grew at the beginning of the 20th century. Along with the widespread change of the design method in the early 90s of the twentieth century, its forms have become more complex. The study showed that with the development of design techniques, this time should be...
-
THE INFLUENCE OF WATER-LAND RELATIONS ON THE LANDSCAPE AND ARCHITECTURE OF THE VISTULA DELTA (POLAND)
PublicationThe Vistula Delta is unique region of water domination. In this part of Europe, historic rural assumptions have been developing since the 12th century. Practically, it can be said that most of the systems were related to the coexistence of the human and the water element. Relations of water and land, developed specific types of villages such as a water-based village. Water landscape; polders, canals, dikes and rivers, hydro-technical...