displaying 1000 best results Help
Search results for: NODE-TARGETED ATTACKS
-
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting
PublicationNDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...
-
Architektura pomników poświęconych ofiarom ataków terrorystycznych jako kontynuacja realizacji komemoratywnych kształtowanych w postpamięci
Publicationarchitecture of Memorials Dedicated to the Victims of terrorist attacks as a continuation of commemorative Structures created within Post-memory Having the rich art of commemorating events of the Second World War as a key reference, this article will try to show how contemporary architectural interven- tions in public space make attempts to respond to the social need of dealing with traumatic events and formulating a new attitude...
-
Thin-walled frames and grids - statics and dynamics
PublicationFrames and grids assembled with thin-walled beams of open cross-section are widely applied in various civil engineering and vehicle or machine structures. Static and dynamic analysis of theses structures may be carried out by means of different models, startingfrom the classical models made of beam elements undergoing the Kirchhoff assumptions to the FE discretization of whole frame into plane elements. The former model is very...
-
Network Graph Transformation Providing Fast Calculation of Paths for Resilient Routing
PublicationProtection of transmission against failures can be appropriately dealt with by alternative paths. However, common schemes (e.g., Bhandaris scheme) are characterized by a remarkable delay while determining the transmission paths. This in turn may have a serious impact on serving dynamic demands (characterized by relatively short duration time). As a remedy to this problem, we introduce an approach to pre-compute the sets of disjoint...
-
Comparison of Transmission Capacities of Two Regulation Systems: Lateral and in-phase Control Transformers
PublicationThis paper presents a comparison of regulation capabilities of lateral and in-phase control transformers in a selected node of a power system. Their regulation capabilities are presented, as well as cross-system exchange options.
-
Fracture simulations in concrete beam under bending using a mesoscopic model with cohesive elements
PublicationThe main aim of this paper was to investigate a complex fracture process in a concrete beam subjected to 3-point bending test by means of the 2D meso-scale FEM with 4-node cohesive elements embedded in the initial mesh of 3-node solid elements. The material heterogeneity was taken into account by considering 3 different phases (aggregate, cement matrix, ITZs) on the basis of randomly generated internal structure of concrete and...
-
Stanisław Barański
PeopleStanisław Barański received BSc in 2019 and MSc in 2020 in informatics at Gdańsk University of Technology. Currently, he is a PhD candidate at the Department of Computer Architecture, Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. His research interests include blockchains and cryptography, especially the issue of blockchain-based internet voting and mitigation of content poisoning...
-
Influence of Dielectric Overlay Permittivity on Size and Performance of Miniaturized ESPAR Antenna
PublicationIn this paper, influence of dielectric overlay permittivity on miniaturized ESPAR antenna parameters is presented. ESPAR antenna is a low-cost and energy-efficient way to implement beam steering capability to a node and improve network performance. The antenna size reduction is obtained by embedding its active and passive elements in ABS based materials of relative permittivity equal to 4, 5.5 and 7.5 in order to achieve network...
-
Bioterrorism — characteristics and possibilities of prevention
PublicationIn the paper bioterrorist threats have been presented. Historical background and possible methods of attacks have been described. The most dangerous pathogens and disease entities have been classified. Selected methods of detection and identification of biological weapon have been presented. The wireless system for threats monitoring — developed at Gdansk University of Technology — has been described.
-
Reliability model of the crankshaft-piston assembly
PublicationThe laws that govern the durability of crankshaft-piston assembly friction nodes can be proved or at least derived or justified in an intuitive way. Operation of all the friction nodes is disturbed by external factors occurring with randomly changing intensity and also appearing at random. As the crankshaft-piston assembly friction nodes have a series structure and effects of those disturbances accumulate, their fitness for use...
-
Toward Fast Calculation of Communication Paths for Resilient Routing
PublicationUtilization of alternate communication paths is a common technique to provide protection of transmission against failures of network nodes/links. However, a noticeable delay is encountered when calculating the relevant sets of disjoint paths using the available algorithms (e.g., using Bhandari’s approach). This, in turn, may have a serious impact on the ability of a network to serve dynamic demands...
-
Ways of performing judo throws, and their efficiency, assessed in the open weight category in All-Japan Judo Championships
PublicationThere is no indication that earlier individual attempts in this area have been carried out in Japan. Judo masters including Kano, Koizumi, Kudo, Mifune, Tomiki and others have tried to introduce additional criteria to the classification. The need for so many modifications is a result of the many sport and referee rule changes, as well as to ensure the safety of competitors and to increase the attractiveness of judo contests. Purpose...
-
Project-Based Collaborative Research and Training Roadmap for Manufacturing Based on Industry 4.0
PublicationThe importance of the economy being up to date with the latest developments, such as Industry 4.0, is more evident than ever before. Successful implementation of Industry 4.0 principles requires close cooperation of industry and state authorities with universities. A paradigm of such cooperation is described in this paper stemming from university partners with partly overlapping and partly complementary areas of expertise in manufacturing....
-
Interior Point Method Evaluation for Reactive Power Flow Optimization in the Power System
PublicationThe paper verifies the performance of an interior point method in reactive power flow optimization in the power system. The study was conducted on a 28 node CIGRE system, using the interior point method optimization procedures implemented in Power Factory software.
-
The reliability of tree and star networks.
PublicationOne of the important parameters characterizing the quality of computer networks is the network's reliability with respect to failures of the communication links and nodes. This chapter investigated the reliability of tree and star networks. The tree and star topology is used in centralized computer networks. In centralized computer networks all communication must take place through some central computer. Following measures of network...
-
On a Recurrence Arising in Graph Compression
PublicationIn a recently proposed graphical compression algorithm by Choi and Szpankowski (2012), the following tree arose in the course of the analysis. The root contains n balls that are consequently distributed between two subtrees according to a simple rule: In each step, all balls independently move down to the left subtree (say with probability p) or the right subtree (with probability 1p). A new node is created as long as...
-
How Specific Can We Be with k-NN Classifier?
PublicationThis paper discusses the possibility of designing a two stage classifier for large-scale hierarchical and multilabel text classification task, that will be a compromise between two common approaches to this task. First of it is called big-bang, where there is only one classifier that aims to do all the job at once. Top-down approach is the second popular option, in which at each node of categories’ hierarchy, there is a flat classifier...
-
Receiver-side fingerprinting method for color images based on a series of quaternion rotations
PublicationThe proposed method is a new Joint Fingerprinting and Decryption (JFD) method that uses a cipher based on quaternion rotation to encrypt color images that are then sent to all users via multicast transmission. Individual encryption keys depend on the users’ fingerprints, so that a unique fingerprint is introduced into the image during decryption for each decryption key. A simulation-based research was conducted to examine the method’s...
-
Porównanie możliwości przesyłowych dwóch układów regulacyjnych: transformatorów z regulacją poprzeczną oraz transformatorów z regulacją wzdłużną
PublicationW artykule przedstawiono porównanie możliwości regulacyjnych transformatorów z regulacją poprzeczną oraz wzdłużną w wybranym węźle systemu elektroenergetycznego. Zaprezentowano możliwości regulacyjne tych układów oraz możliwości kształtowania wymiany międzysystemowej.
-
Mission impossible for cellular internalization: When porphyrin alliance with UiO-66-NH2 MOF gives the cell lines a ride
PublicationIs it possible to accelerate cell internalization by hybridization of nanomaterials? Herein we support the realization of using metal-organic frameworks (MOFs) with the assistance of rigid porphyrin structure (H2TMP) aimed at drug loading, drug release, relative cell viability, and targeted in vitro drug delivery. There are several MOFs, i.e., UiO-66-NH2 (125 ± 12.5 nm), UiO-66-NH2 @H2TMP (160 ± 14 nm), UiO-66-NH2 @H2TMP@DOX, and...
-
Collision-Free Network Exploration
PublicationA set of mobile agents is placed at different nodes of a n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round may two agents occupy the same node. In each round, an agent may choose to stay at its currently occupied node or to move to one of its neighbors. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest possible...
-
Controlling nodal displacement of pantographic structures using matrix condensation and interior-point optimization: A numerical and experimental study
PublicationThis study presents an innovative approach for the precise control of nodal displacements in pantographic structures. The method is founded on the Matrix Condensation of Force Method, seamlessly integrated with an Interior Point Optimization algorithm. This combination offers a unique advantage by allowing users to manipulate displaced nodes within a defined coordination domain. Furthermore, this approach introduces the Interior...
-
Approximation Strategies for Generalized Binary Search in Weighted Trees
PublicationWe consider the following generalization of the binary search problem. A search strategy is required to locate an unknown target node t in a given tree T. Upon querying a node v of the tree, the strategy receives as a reply an indication of the connected component of T\{v} containing the target t. The cost of querying each node is given by a known non-negative weight function, and the considered objective is to minimize the total...
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublicationThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
Detection of illicit chemicals by portable Raman spectrometer
PublicationThe Raman spectrometers can be built as the portable devices and can be used in various places to detect illicit chemicals. This method has become popular due to deficiency of other fast methods that could be applied against terrorist attacks or could help police at their work. The conception of a portable Raman spectrometer has been presented. The description enclosures presentation of the prepared device and its possible applications...
-
Evaluating Security and Resilience of Critical Networked Infrastructures after Stuxnet
PublicationThe chapter presents the current configuration of the simulation environment for the evaluations of the security and resilience of critical networked infrastructures, which enables simulations of Stuxnet-like attacks. The configuration includes new features added to the MAlSim - Mobile Agent Malware Simulator after the advent of Stuxnet in reference to the experiments aiming at the security evaluation of a power plant which we...
-
Bounds on the cover time of parallel rotor walks
PublicationThe rotor-router mechanism was introduced as a deterministic alternative to the random walk in undirected graphs. In this model, a set of k identical walkers is deployed in parallel, starting from a chosen subset of nodes, and moving around the graph in synchronous steps. During the process, each node successively propagates walkers visiting it along its outgoing arcs in round-robin fashion, according to a fixed ordering. We consider...
-
Timber frame houses resistant to dynamic loads - seismic analysis
PublicationThe aim of the article is to present results of seismic analysis results of two real-sized timber frame buildings subjected to seismic excitations. The first model was insulated with mineral wool, the second one with polyurethane foam. Technology and specifications involved in both models construction is based on the previously conducted experimental research on timber frame houses, including wall panels tests, wall numerical models...
-
Collision-free network exploration
PublicationMobile agents start at different nodes of an n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round two agents may occupy the same node. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest time required to reach a configuration in which each agent has visited all nodes and returned to its starting location. In...
-
Receiver-side fingerprinting method based on quaternion sandwich product
PublicationIn this paper a new receiver-side fingerprinting method for color images is proposed. The proposed method belongs to the group of Joint Fingerprinting and Decryption (JFD) methods. Each component of the color image is represented as a point in 3D space, which is formed by 3 color channels. Encryption and fingerprinting can be interpreted as rotation, scaling and translation of these points. Calculations are performed using quaternion...
-
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
PublicationBiometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...
-
Bounds on the Cover Time of Parallel Rotor Walks
PublicationThe rotor-router mechanism was introduced as a deterministic alternative to the random walk in undirected graphs. In this model, a set of k identical walkers is deployed in parallel, starting from a chosen subset of nodes, and moving around the graph in synchronous steps. During the process, each node maintains a cyclic ordering of its outgoing arcs, and successively propagates walkers which visit it along its outgoing arcs in...
-
Towards Scalable Simulation of Federated Learning
PublicationFederated learning (FL) allows to train models on decentralized data while maintaining data privacy, which unlocks the availability of large and diverse datasets for many practical applications. The ongoing development of aggregation algorithms, distribution architectures and software implementations aims for enabling federated setups employing thousands of distributed devices, selected from millions. Since the availability of...
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublicationAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Collaborative Exploration of Trees by Energy-Constrained Mobile Robots
PublicationWe study the problem of exploration of a tree by mobile agents (robots) that have limited energy. The energy constraint bounds the number of edges that can be traversed by a single agent. We use a team of agents to collectively explore the tree and the objective is to minimize the size of this team. The agents start at a single node, the designated root of the tree and the height of the tree is assumed to be less than the energy...
-
Identification of the Contamination Source Location in the Drinking Water Distribution System Based on the Neural Network Classifier
PublicationThe contamination ingression to the Water Distribution System (WDS) may have a major impact on the drinking water consumers health. In the case of the WDS contamination the data from the water quality sensors may be efficiently used for the appropriate disaster management. In this paper the methodology based on the Learning Vector Quantization (LVQ) neural network classifier for the identification of the contamination source location...
-
THE CONCEPT OF MODELING OF SNOW IMPACT ON THE STRUCTURE OF THE SUSPENDED TAURON ARENA ROOF IN CRACOW
PublicationThe article presents studies and numerical simulations on modeling snow influence on TAURON ARENA suspended roof structure in Cracow. The scope of work includes experimental tests, functions solutions taking into account various cases of snow impact according to PN and EC, as well as numerical simulations for the sport and entertainment arena in the Czyzyny district. The FEM roof structure model developed in the SOFISITK software...
-
LYMPH NODES, Gastric lymph node - Male, 75 - Tissue image [9180729562256271]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
LYMPH NODES, Cervical lymph node - Male, 79 - Tissue image [6280730027952931]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
LYMPH NODES, Axillary lymph node - Female, 64 - Tissue image [2210630020359161]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
LYMPH NODES, Cervical lymph node - Male, 43 - Tissue image [3280730025604091]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
LYMPH NODES, Iliac lymph node - Female, 45 - Tissue image [5270730023455621]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
LYMPH NODES, Ileocolic lymph node - Female, 80 - Tissue image [6110730021442411]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
LYMPH NODES, Cervical lymph node - Male, 72 - Tissue image [6280730027945991]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
LYMPH NODES, Cervical lymph node - Male, 58 - Tissue image [6280730027946321]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
LYMPH NODES, Cervical lymph node - Male, 58 - Tissue image [6280730027944131]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
LYMPH NODES, Cervical lymph node - Male, 58 - Tissue image [6280730027949431]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
LYMPH NODES, Intestinal lymph node - Female, 79 - Tissue image [8200729592218921]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
LYMPH NODES, Cervical lymph node - Male, 43 - Tissue image [328073002560411]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
LYMPH NODES, Axillary lymph node - Female, 40 - Tissue image [5230730013289141]
Open Research DataThis is the histopathological image of LYMPH NODES tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: VS200 Olympus slide scanner (20x magnification) and saved to DICOM format.