Filters
total: 706
-
Catalog
Search results for: BELARUS, SECURITY STRATEGIES, THE RUSSIAN FEDERATION, THE COLLECTIVE SECURITY TREATY ORGANISATION
-
Platforma KASKADA jako system zapewniania bezpieczeństwa poprzez masową analizę strumieni multimedialnych w czasie rzeczywistym
PublicationW artykule przedstawiono Platformę KASKADA rozumianą jako system przetwarzania danych cyfrowych i strumieni multimedialnych oraz stanowiącą ofertę usług wspomagających zapewnienie bezpieczeństwa publicznego, ocenę badań medycznych i ochronę własności intelektualnej. celem prowadzonych prac było stworzenie innowacyjnego systemu umozliwiajacego wydajną i masową analizę dokumentów cyfrowych i strumieni multimedialnych w czasie rzeczywistym...
-
Possibilities for Developing Electromobility by Using Autonomously Powered Trolleybuses Based on the Example of Gdynia
PublicationTrolleybus transport refers to contemporary challenges related to a reduction in emissions of greenhouse gases and CO2 into the atmosphere formulated by international institutions, such as the United Nations, the Organisation for Security and Co-operation in Europe, or the European Union. Departure from fossil fuels in urban transport is one of the key challenges for the coming years. Trolleybuses are an important tool in this...
-
A place of school in the idea of the sustainable development
PublicationWell designed school space enables social contacts, increases activity of pupils and improves the condition of their health. However, the best design would not bring the expected benefits if it is not integrated with the surroundings in terms of transportation, security and local needs. In the sustainable development, the social goals are in harmony with ecological aims according to the rule of "3 r" (reduce, reuse, recycle).
-
Self-Organizing Wireless Monitoring System for Containers
PublicationThis paper presents a description of new global monitoring system for containers, with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing Container Monitoring Network...
-
Self-organizing wireless monitoring system for cargo containers
PublicationThis paper presents a description of new global monitoring system for containers with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing ContainerMonitoring Network is...
-
Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
PublicationMultihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...
-
Further developments of parameterization methods of audio stream analysis for secuirty purposes
PublicationThe paper presents an automatic sound recognition algorithm intended for application in an audiovisual security monitoring system. A distributed character of security systems does not allow for simultaneous observation of multiple multimedia streams, thus an automatic recognition algorithm must be introduced. In the paper, a module for the parameterization and automatic detection of audio events is described. The spectral analyses...
-
Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks
PublicationThe increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated...
-
International Conference on Information Security and Assurance
Conferences -
International Conference on Security in Pervasive Computing
Conferences -
International Conference on Computational Intelligence and Security
Conferences -
International Workshop on Visualization for Cyber Security
Conferences -
Australian Information Security Management Conference
Conferences -
Information Hiding and Multimedia Security Workshop
Conferences -
International Conference on Information and Communications Security
Conferences -
International Conference on Information Theoretic Security
Conferences -
International Conference on Principles of Security and Trust
Conferences -
IFIP Information Security & Privacy Conference
Conferences -
Australasian Conference on Information Security and Privacy
Conferences -
International Workshop on Information Security Applications
Conferences -
International IEEE Security in Storage Workshop
Conferences -
International Conference on Information Security and Cryptology
Conferences -
Workshop on Security and Privacy in e-Commerce
Conferences -
Computational Intelligence in Security for Information Systems
Conferences -
International Conference on Security of Information and Networks
Conferences -
International Conference on Information Systems Security
Conferences -
Australian Information Warfare and Security Conference
Conferences -
Financial Cryptography and Data Security Conference
Conferences -
Workshop in Information Security Theory and Practices
Conferences -
International Conference on Information Security and Cryptography
Conferences -
International Symposium on Information Assurance and Security
Conferences -
Australasia Conference on Information Security and Privacy
Conferences -
International Conference on Cryptology and Network Security
Conferences -
Symposium on Requirements Engineering for Information Security
Conferences -
SKLOIS Conference on Information Security and Cryptology
Conferences -
Annual Conference on Privacy, Security and Trust
Conferences -
International Workshop on Issues in the Theory of Security
Conferences -
Information Security Practice and Experience Conference
Conferences -
International Conference on network and System Security
Conferences -
International Workshop on Security in Information Systems
Conferences -
IEEE European Symposium on Security and Privacy
Conferences -
ACM Conference on Computer and Communications Security
Conferences -
Annual Computer Security Applications Conference
Conferences -
European Symposium On Research In Computer Security
Conferences -
International Conference on Availability, Reliability and Security
Conferences -
Narracje o świeżej traumie. Upamiętnianie ataków terrorystycznych w krajobrazie codziennym miast
PublicationRecent trauma Narratives: commemorating terrorist attacks in Everyday cityscape Contemporary city incidentally becomes a non-accidental target of acts violating the primary sense of security and safety. The fundamental assumptions about so- cial and interpersonal interactions that guarantee social life are severely disturbed. These events, primarily the ones related to terrorist attacks, leave in social memo- ry traces associated...
-
Implementing decisional trust: a first approach for smart reliable systems
PublicationIn this article, we introduce the necessary elements that must be integrated in order to achieve a decisional technology that is trustworthy. Thus, we refer to such technology as decisional trust. For us, decisional trust can be achieved through the use of elements such as the decisional DNA, reflexive ontologies, and security models; and therefore, we present in this article a framework that was used for the implementation of...
-
Asia Conference on Information, Computer and Communications Security (ACM Symposium on Information, Computer and Communications Security)
Conferences -
Resolving conflicts in object tracking for automatic detection of events in video
PublicationAn algorithm for resolving conflicts in tracking of moving objects is presented. The proposed approach utilizes predicted states calculated by Kalman filters for estimation of trackers position, then it uses color and texture descriptors in order to match moving objects with trackers. Problematic situations, such as splitting objects, are addressed. Test results are presented and discussed. The algorithm may be used in the system...
-
Towards Cognitive and Perceptive Video Systems
PublicationIn this chapter we cover research and development issues related to smart cameras. We discuss challenges, new technologies and algorithms, applications and the evaluation of today’s technologies. We will cover problems related to software, hardware, communication, embedded and distributed systems, multi-modal sensors, privacy and security. We also discuss future trends and market expectations from the customer’s point of view.