Filters
total: 1910
filtered: 1766
-
Catalog
Chosen catalog filters
displaying 1000 best results Help
Search results for: COLLUSION ATTACK
-
Possible uses of crisis situation aiding system in virtual world simulation
PublicationMany of the real world crisis situations like spreading fire, hostile units attack, flood, and etc. are commonly used in computer games where a simulation of extensive virtual world is crucial. This paper presents some ideas for possible uses of existing crisis situation aiding system in such environments. Moreover, it shows how this kind of system can be taught during subsequent games with a large number of players. As an example...
-
Mesh dependence study for numerical assessment of hydrodynamic characteristics of windsurfing fin
PublicationThe presented research aims to assess the drag coefficient and lift coefficient versus angle of attack curves for windsurfing fin. Special attention in the research was being paid to the evaluation of the stall angle value. The angle of incidence for which the stall occurs was searched, and the sensitivity of the solution for the mesh resolution was studied. The mesh resolution sensitivity analysis was done by systematically decreasing...
-
Investigating Noise Interference on Speech Towards Applying the Lombard Effect Automatically
PublicationThe aim of this study is two-fold. First, we perform a series of experiments to examine the interference of different noises on speech processing. For that purpose, we concentrate on the Lombard effect, an involuntary tendency to raise speech level in the presence of background noise. Then, we apply this knowledge to detecting speech with the Lombard effect. This is for preparing a dataset for training a machine learning-based...
-
Biometric identity verification
PublicationThis chapter discusses methods which are capable of protecting automatic speaker verification systems (ASV) from playback attacks. Additionally, it presents a new approach, which uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. We show that in this case training the system with large amounts of spectrogram patches may be difficult, and...
-
The Novel Findings About the Hussite’s Warfares in the Gdansk/Danzig Surrounding in the Late Summer of 1433
PublicationOne of the most spectacular episodes during the Hussite Wars was the Czech raid through the lands of the Teutonic Order up to the Baltic Sea in 1433. Although historians and then-witnesses focused on the sacked Cistercian Abbey in Oliva and soldiers filling the bottles with seawater, the scale of damages in the main harbour of Prussia and its surroundings has not been the subject of research yet. Furthermore, most scholars treatthe...
-
CFD modeling of a diesel evaporator used in fuel cell systems
Publication -
CFD analysis of jet flows ejected from different nozzles
Publication -
Scattering of electrons by a 1,2-butadiene (C4H6) molecule: measurements and calculations
PublicationWe present the results of experimental and theoretical study on electron collisions with a 1,2-butadiene (H2C=C=CHCH3) molecule. Absolute grand-total cross sections (TCSs) were measured using a linear electron-transmission method for collision energies in the 0.5–300 eV range. Two distinct features in the TCS energy curve were detected: a narrow peak located at 2.3 eV and a broad enhancement centered around 9 eV. We attributed...
-
Fragility analysis of structural pounding between adjacent structures arranged in series with various alignment configurations under near‑field earthquakes
PublicationA major cause of local to total damages is related to structural pounding in a large number of past earthquakes. In general, these collisions take place as a result of differences in the dynamic characteristics of the colliding structures. To acquire a better perception of the behavior of structures, in this paper, three structures featuring different heights are modeled in series and with various configurations next to each other...
-
IR-THERMAL IMAGING IN CARDIOSURGERY
PublicationA method for monitoring the state of the myocardium during cardiosurgical interventions based on thermal IR imaging is presented. These methods called Static Thermography and Active Dynamic Thermography (ADT) uses information about distribution of temperature on the surface and an external excitation source to induce thermal transient processes in a tested object. Recording time series of thermograms allows to calculate parametric...
-
Investigation on environmental chemistry changes in the Antarctic Special Management Area (ASMA 1): King George Island, South Shetlands Islands
PublicationThe doctoral dissertation included a review of the scientific literature that resulted in the selection of the research area, type of samples and chemical species that were marked. The published series of articles contains an in-depth description of the results of chemical analyses of surface water, sediment and snow samples from the Antarctic Specially Managed Area (ASMA 1) – King George Island. In addition, studies have been...
-
Influence of windsurfing fin stiffness distribution on the lift-drag characteristics
PublicationThis article addresses the problem of determining the hydromechanical loads generated by flexible hydrofoils. The research was done on the example of the composite windsurfing fin for the RS:X monotype class. Despite the assumption of fins identity, everyday practice showed that variations of mechanical properties occur and strongly affect their performance. Therefore, we decided to study the differences between the windsurfing...
-
Trace elements content of surface peat deposits in the Solovetsky Islands (White Sea)
PublicationPeatlands form environmental archives of trace element deposition. In this regard they are particularly valuable for areas such as the Arctic, where regular pollution monitoring is either impossible or extremely costly. The aim of this study was to assess pollution in the Solovetsky Islands (65° 05' N, 35° 53' E) by examining the spatial variability in trace element content of the uppermost layer of peat, immediately below the...
-
Advanced Ship Control Methods
PublicationThe chapter presents two main streams of research in vessel control at sea: dynamic positioning (DP) of the vessel and decision support in case of collision at sea. The control structure and basic requirements for the DP system are defined. Selected issues of automatic control of a dynamically positioned vessel are discussed. A review of advanced methods of controlling a DP ship is carried out, taking into account the tasks of...
-
Simulating Malware with MAlSim
PublicationThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating malware with MAlSim
PublicationThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting
PublicationNDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...
-
Architektura pomników poświęconych ofiarom ataków terrorystycznych jako kontynuacja realizacji komemoratywnych kształtowanych w postpamięci
Publicationarchitecture of Memorials Dedicated to the Victims of terrorist attacks as a continuation of commemorative Structures created within Post-memory Having the rich art of commemorating events of the Second World War as a key reference, this article will try to show how contemporary architectural interven- tions in public space make attempts to respond to the social need of dealing with traumatic events and formulating a new attitude...
-
Government in the metaverse: Requirements and suitability for providing digital public services
PublicationDigital government comprises all means to enable governments to interact with their constituents digitally. The metaverse provides a virtual reality environment where various activities can be carried out without physically visiting the places of interest, including the public authorities. Yet, how governments can use the metaverse is unknown. This paper aims to extend the understanding of the metaverse architecture requirements...
-
A framework for Air Quality Management Zones - Useful GIS-based tool for urban planning: Case studies in Antwerp and Gdańsk
PublicationThere is a growing recognition of the importance of proper urban design in the improvement of air flow and pollution dispersion and in reducing human exposure to air pollution. However, a limited number of studies have been published so far focusing on the development of standard procedures which could be applied by urban planners to effectively evaluate urban conditions with respect to air quality. To fill this gap, a new approach...
-
Energy Recovery Analysis in A-Type Pressure Regulation and Measurement Stations in Istanbul, Esenyurt
Publication -
Coastal Cliffs Monitoring and Prediction of Displacements Using Terrestial Laser Scanning
PublicationCoastal cliffs are very sensitive to degradation caused by erosion and abrasion. Thus, it is very important to monitor susceptibility of the cliffs in terms of slope angles and ground fall resulting from vertical morphology of the cliffs. The results could be used for example to establish the boundaries of the safe investments zone or retreat infrastructure buildings in case of real threat such as degradation of the objects of...
-
Diver Observations by Means of Acoustic Methods
PublicationSearching for objects, especially small ones, moving under water near its the free surface, is always not an easy task. Designing tools for the detection of such targets is a real challenge when the possibility of a terrorist attack is a real threat. This paper presents some aspects of diver detection by means of acoustics methods, both active (side scan sonar) and passive ones (linear receiving antenna). This approach is quite...
-
Analysis and Comparison of Safety of Children and Adult Passenger in Car Based on Crash Tests Results
PublicationMost important features of the child seat were presented. There was made analysis of selected dynamic loads acting on mannequins heads during a collision. Comparison of loads acting on the kid in a child seat and the other passengers in a car is presented. In analysis of the results particular attention has been paid on the children's secure in a car. The phenomena of collision child's occipital bone with seat backrest was described....
-
ThreSpect – A Program for the Determination of the Appearance Energies of Neutral and Ionized Species
PublicationCollisions of photons and charged particles with molecules lead to their excitation, ionization, and dissociation into neutral and ionized fragments. Accurately determining thresholds of the formation of particular products plays a vital role in analyzing processes occurring during these interactions. Therefore, we present a computer program, “ThreSpect,” that allows calculating threshold energies of various species generated in...
-
NUMERICAL ANALYSIS OF RUBBER BUMPERS INFLUENCE ON THE COLLIDING STEEL STRUCTURES
PublicationProblem of collisions of neighbouring structures is one of the important issues related to the safety of civil engineering structures. The safety and reliability of steel structures under impact loading is among a number of different aims during the design state. The aim of this paper is to present the results of numerical investigation of dynamic behavior of closely-separated steel structures under seismic excitation. Modal and transient...
-
Nitrogen and phosphorus compounds in coastal aquifers in Puck municipality area (northern Poland)
Publication1. Groundwater study shows local variations in chemical composition of selected aquifers caused by human impact The diversity is mainly manifested in • time variation of groundwater chemical composition of all analyzed parameters especially in shallow aquifers (Q1) • relationship between t he ground water chemical composition and depth of the aquifer where an inverse concentration distribution occurs higher concentrations are observed...
-
Contamination of water in Oliwski Stream after the flood in 2016
PublicationIn the article pollution of stream waters with surface runoff from an urbanized area caused by an extremely high rainfall is discussed. The analyzes were carried out after the rainfall of the depth 152 mm which took place in Gdańsk on 14th and 15th July 2016. This extreme rainfall caused urban flooding, damage of several retention ponds and pollution of surface waters. In the article the results of physical and chemical analyzes...
-
A general approach to study molecular fragmentation and energy redistribution after an ionizing event
PublicationWe propose to combine quantum chemical calculations, statistical mechanical methods, and photoionization and particle collision experiments to unravel the redistribution of internal energy of the furan cation and its dissociation pathways. This approach successfully reproduces the relative intensity of the different fragments as a function of the internal energy of the system in photoelectron–photoion coincidence experiments and...
-
Bioterrorism — characteristics and possibilities of prevention
PublicationIn the paper bioterrorist threats have been presented. Historical background and possible methods of attacks have been described. The most dangerous pathogens and disease entities have been classified. Selected methods of detection and identification of biological weapon have been presented. The wireless system for threats monitoring — developed at Gdansk University of Technology — has been described.
-
Device for spoofing in global positioning system
PublicationThis article describes the device which may be used to generate false GPS signals and emit them into radio communication channel. Such attack is called GPS spoofing. Each GPS receiver which remains in the range of a spoofing device (called spoofer) indicates time and position coordinates which are predetermined by the spoofer’s operator. Spoofing may be used e.g. in order to disable the terrorist group from obtaining correct navigation...
-
How Integration of a Brain-Machine Interface and Obstacle Detection System Can Improve Wheelchair Control via Movement Image
PublicationThis study presents a human-computer interaction combined with a brain-machine interface (BMI) and obstacle detection system for remote control of a wheeled robot through movement imagery, providing a potential solution for individuals facing challenges with conventional vehicle operation. The primary focus of this work is the classification of surface EEG signals related to mental activity when envisioning movement and deep relaxation...
-
Highly Dissipative Materials for Damage Protection against Earthquake-Induced Structural Pounding
PublicationIt is a common situation that seismic excitations may lead to collisions between adjacent civil engineering structures. This phenomenon, called earthquake-induced structural pounding, may result in serious damage or even the total collapse of the colliding structures. Filling the gap between two buildings erected close to one another by using visco-elastic materials can be considered to be one of the most effective methods to avoid...
-
Future Directions in Quantum Materials Synthesis
PublicationThe following sections are included: Introduction The Current State of the Art The Frontiers Exploring the Frontiers Conclusion
-
Stock price reactions to an arrangement approval in restructuring proceedings – the case of Poland
PublicationThe study aims to empirically analyze the reaction of stock prices to the information about the conclusion and acceptance of a debtor–creditor arrangement under restructuring proceedings of companies listed on the stock exchange in Poland. The following main research hypothesis was verified: public disclosure of information about an arrangement conclusion and acceptance in restructuring proceedings...
-
Development of a simple biogas analyzer module (BAM) for real-time biogas production monitoring
PublicationAnaerobic digestion (AD) relies on the cooperation of specific microbial communities, making it susceptible to process disruptions that could impact biogas production. In this regard, this study presents a technological solution based on the Arduino platform, in the form of a simple online monitoring system that can track the produced biogas profile, named as biogas analyzer module (BAM). The applicability of the BAM focused on...
-
Linking of adjacent three-storey buildings for mitigation of structural pounding during earthquakes
PublicationThe reports after major earthquakes indicate that the earthquake-induced pounding between insufficiently separated buildings may lead to significant damage or even total collapse of structures. An intensive study has recently been carried out on mitigation of pounding hazards so as to minimize the structural damages or prevent collisions at all. The aim of this paper is to investigate the effectiveness of the method when two adjacent...
-
Applicability of null-steering for spoofing mitigation in civilian GPS
PublicationCivilian GPS signals are currently used in many critical applications, such as precise timing for power grids and telecommunication networks. Spoofing may cause their improper functioning. It is a threat which emerges with the growing availability of GPS constellation simulators and other devices which may be used to perform such attack. Development of the effective countermeasures, covering detection and mitigation, is necessary...
-
Comparison of Single and Multi-Population Evolutionary Algorithm for Path Planning in Navigation Situation
PublicationIn this paper a comparison of single and multi-population evolutionary algorithm is presented. Tested algorithms are used to determine close to optimal ship paths in collision avoidance situation. For this purpose a path planning problem is defined. A specific structure of the individual path and fitness function is presented. Principle of operation of single-population and multi-population evolutionary algorithm is described....
-
COLREGS compliance in Evolutionary Sets of Cooperating Ship Trajectories
PublicationIn general, Evolutionary Sets of Cooperating Ship Trajectories combine some of the assumptions of game theory with evolutionary programming and aim to find optimal set of cooperating trajectoriesof all ships involved in an encounter situation. In a two-ship encounter situation the method enables the operator of an on-board collision-avoidance system to predict the most probable behaviour of atarget and to plan the own manoeuvres...
-
Data set generation at novel test-rig for validation of numerical models for modeling granular flows
PublicationSignificant effort has been exerted on developing fast and reliable numerical models for modeling particulate flow; this is challenging owing to the complexity of such flows. To achieve this, reliable and high-quality experimental data are required for model development and validation. This study presents the design of a novel test-rig that allows the visualization and measurement of particle flow patterns during the collision...
-
Trust Dynamics Analysis of CTR Scheme Subversion under Virtual Anonymity and Trust-Unaware Partner Selection
PublicationWe propose a framework to study Markovian trust value dynamics in a centralized Computational Trust and Reputation (CTR) scheme under trust-unaware partner selection using a mean-value approximation. Analytically founded answers are sought to questions like: Can dishonest agents subvert the CTR scheme (i.e., acquire higher trust values than honest agents)? Is indirect reciprocity incentivized? Is there a qualitative impact of a...
-
Tereny polarne - interesującym obszarem do badań Cz. II - Analityka próbek abiotycznych w Arktyce
PublicationW pracy ujęto problematykę zanieczyszczeń obszarów polarnych. Zwrócono szczególną uwagę na trwałe związki organiczne obecne w rejonie Arktyki w elementach przyrody nieożywionej. TZO pochodzenia antropogenicznego mogą pojawiać się na terenach polarnych za sprawą transportu na duże odległości z obszarów Euroazji i Ameryki Północnej. Badania poziomów zanieczyszczeń obecnych w próbkach abiotycznych na obszarze Arktyki stanowią fundament...
-
Assessment of the water quality of Kłodnica River catchment using self-organizing maps
PublicationRisk assessment of industrial areas heavily polluted due to anthropogenic actions is of increasing concern worldwide. So is the case of Polish Silesia region where mostly heavy industry like smelters, mining, chemical industries as well as heat and electricity production facilities are being located. Such situation raises numerous questions about environmental state of local water bodies with special attention paid to the Kłodnica...
-
PTR-MS and electronic nose application for volatile fraction analysis of cigar tobacco
PublicationCigar consumers attach great importance to the quality of these products. At the same time, cigars are often expensive, so destructive analytical methods of quality control are not being desired. However, it has been found that there are many volatile organic compounds in their headspace. Because of that, proton transfer reaction–mass spectrometry and electronic nose were used to analyse it. The obtained results were used to distinguish...
-
Accuracy of Differential Phase Delay Estimation for GPS Spoofing Detection
PublicationGPS spoofing is an attack based on transmission of false signals to target receivers, in order to force the computation of incorrect time, position or velocity information. It is a threat which is recently considered with continuously growing awareness. There is a need for effective way of GPS spoofing detection. Many groups of methods are proposed in the literature. Spatial processing methods are considered to be robust in a wide...
-
An Impact Analysis of Artificial Light at Night (ALAN) on Bats. A Case Study of the Historic Monument and Natura 2000 Wisłoujście Fortress in Gdansk, Poland
PublicationThe artificial light at night (ALAN) present in many cities and towns has a negative impact on numerous organisms that live alongside humans, including bats. Therefore, we investigated if the artificial illumination of the historic Wisłoujście Fortress in Gdańsk, Poland (part of the Natura 2000 network), during nighttime events, which included an outdoor electronic dance music (EDM) festival, might be responsible for increased...
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublicationThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
Mury oporowe z gruntu zbrojonego z przekładkami z keramzytu
PublicationW czerwcu 2019 r. nastąpiło otwarcie nowo budowanego wiaduktu na ulicy Drwęckiej w Ostródzie, który zastąpił jeden z trzech przejazdów kolejowo-drogowych znajdujących się w centrum miasta. Zakończenie budowy bezkolizyjnego przejazdu nad torami kolejowymi pozwoliło na bezpieczne oraz szybkie połączenie północnej i południowej części Ostródy. Zastosowanie materacy z keramzytu w konstrukcji z gruntu zbrojonego.
-
Positron Scattering and Annihilation in Organic Molecules
PublicationIn this paper, we address the problem of connecting positron lifetimes in liquids with collision cross sections in gases. We present the analyses of annihilation lifetime spectra of positrons in the liquid benzene, c-hexane, n-hexane, methanol and ethanol and calculations of scattering cross sections of positrons with benzene and c-hexane in the gas phase.