Filters
total: 1433
filtered: 837
-
Catalog
Chosen catalog filters
Search results for: SECURITY ONTOLOGY
-
RSS-Based DoA Estimation Using ESPAR Antenna for V2X Applications in 802.11p Frequency Band
PublicationIn this paper, we have proposed direction-of arrival (DoA) estimation of incoming signals for V2X applications in 802. 11p frequency band, based on recording of received signal strength (RSS) at electronically steerable parasitic array radiator (ESPAR) antenna's output port. The motivation of the work was to prove that ESPAR antenna used to increase connectivity and security in V2X communication can be also used for DoA estimation....
-
Modeling the impact of surface currents in a harbor using graph theory
PublicationEnsuring security in a harbor requires research into its infrastructure using spatial environmental data. This paper presents a methodology that defines the design of a graph for modeling the interactions between surface currents and moving objects. Combining this graph with port charts that integrate electronic navigation charts with coastal orthophotographs allows us to perform a multidimensional analysis. In addition, the complete...
-
Definiowanie wiarygodności w Sieci Semantycznej metodą ontologicznego opisu asercji
PublicationW rozdziale została zaprezentowana metoda definiowania wiarygodności w Sieci Semantycznej oraz wnioskowania z wiedzy opisanej w kontekście wiarygodności. Przedstawiona w rozdziale metoda opisuje zasadę budowania opisu wiarygodności dla części asercjonalnej ontologii. Definiowanie wiarygodności metodą ontologicznego opisu asercji jest rozumiane jako przypisanie asercjom unarnym i binarnym zbioru cech i ich wartości. W rozdziale...
-
Transient detection for speech coding applications
PublicationSignal quality in speech codecs may be improved by selecting transients from speech signal and encoding them using a suitable method. This paper presents an algorithm for transient detection in speech signal. This algorithm operates in several frequency bands. Transient detection functions are calculated from energy measured in short frames of the signal. The final selection of transient frames is based on results of detection...
-
EU-Russian Relations and the Eastern Enlargement: Integration or Isolation
Publication -
Democratisation and Institutional Development in Romania after 1989
Publication -
The role and importance of WIMAX mobile system as a high-performance data transfer technology in wireless sensor networks for wide area monitoring applications
PublicationThe study discuses basic features and functional design of WiMAX Mobile system, based on the IEEE 802.16e (Release 1.5 Rev. 2.0) standard. The analysis has been made in terms of ability to use this system to transmit video stream related to monitoringof large agglomeration areas. What is more, the study includes comparison of technical parameters of WiMAX Mobile system with competitive systems such as: HSPA+ and UMTS-LTE, which...
-
Recognition of hazardous acoustic events employing parallel processing on a supercomputing cluster . Rozpoznawanie niebezpiecznych zdarzeń dźwiękowych z wykorzystaniem równoległego przetwarzania na klastrze superkomputerowym
PublicationA method for automatic recognition of hazardous acoustic events operating on a super computing cluster is introduced. The methods employed for detecting and classifying the acoustic events are outlined. The evaluation of the recognition engine is provided: both on the training set and using real-life signals. The algorithms yield sufficient performance in practical conditions to be employed in security surveillance systems. The...
-
A Novel Multicast Architecture of Programmable Networks
PublicationIn the paper a multicast architecture for programmable networks based on separation of group management and network control tasks is proposed. Thanks to this separation, services which want to make use of multicast communications no longer have to implement low-level network functionalities and their operation is greatly simplified. Abstracting service’s view of the network into a fully connected cloud enables us to transparently...
-
Multi-Stage Video Analysis Framework
PublicationThe chapter is organized as follows. Section 2 presents the general structure of the proposed framework and a method of data exchange between system elements. Section 3 is describing the low-level analysis modules for detection and tracking of moving objects. In Section 4 we present the object classification module. Sections 5 and 6 describe specialized modules for detection and recognition of faces and license plates, respectively....
-
Standards Conformity Framework in comparison with contemporary methods supporting standards application
PublicationAchieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is spent on fulfilment of safety and security requirements. However, standards application is not supported sufficiently by the tools available on the market. Therefore, Standards Conformity Framework (SCF) containing methods and tools which provide support...
-
Cybersecurity and Privacy in Standards for Smart Grids – a Comprehensive Survey
PublicationResilient information and communications technologies are a prerequisite for reliable operation of smart grid. In recent years, many standards for the new form of electricity network have been proposed, which results in operators and other smart grid stakeholders having difficulties in finding the documents which can be related to their particular problems. The purpose of this paper is to bring in all smart grid standards that...
-
Chirurgiczne leczenie chorych na raka pęcherzyka żółciowego: doświadczenia własne na podstawie 16 przypadków
Publication -
Belinostat in Patients With Relapsed or Refractory Peripheral T-Cell Lymphoma: Results of the Pivotal Phase II BELIEF (CLN-19) Study
Publication -
Ibrutinib as Treatment for Patients With Relapsed/Refractory Follicular Lymphoma: Results From the Open-Label, Multicenter, Phase II DAWN Study
Publication -
Venetoclax for Patients With Chronic Lymphocytic Leukemia With 17p Deletion: Results From the Full Population of a Phase II Pivotal Trial
Publication -
The Relationship of Purpose in Life and Hope in Shaping Happiness Among Patients with Cancer in Poland
Publication -
Molecular differences in mitochondrial DNA genomes of dogs with malignant mammary tumours
Publication -
Prognostic Value of TOP2A Gene Amplification and Chromosome 17 Polysomy in Early Breast Cancer
Publication -
Identification of High-Risk Stage II Colorectal Tumors by Combined Analysis of the NDRG1 Gene Expression and the Depth of Tumor Invasion
Publication -
Complementary and alternative medicine (CAM) use among patients with cancer undergoing palliative care: A pilot study of a single institution in Poland.
Publication -
Glioblastoma-derived spheroid cultures as an experimental model for analysis of EGFR anomalies
Publication -
Comparison of peptide cancer signatures identified by mass spectrometry in serum of patients with head and neck, lung and colorectal cancers: Association with tumor progression
Publication -
High- and low-Molecular Weight oat Beta-Glucan Reveals Antitumor Activity in Human Epithelial Lung Cancer
Publication -
Differential antitumor effects of vitamin D analogues on colorectal carcinoma in culture
Publication -
Expression profiles of vault components MVP, TEP1 and vPARP and their correlation to other multidrug resistance proteins in ovarian cancer
Publication -
Deep Learning-based Recalibration of the CUETO and EORTC Prediction Tools for Recurrence and Progression of Non–muscle-invasive Bladder Cancer
Publication -
Zastosowanie metod termograficznych w ocenie obrzęku limfatycznego kończyny górnej u chorych po amputacji piersi z powodu raka
Publication.
-
Why they want to be treated in clinical trial -fundamental reasons of patient's decision
Publication -
PUB073 Lung Cancer Screening with LDCT – Results of a Small Cohort Continual Monitoring (Pilot Silesian Study)
Publication -
P3.13-032 The Impact of Tobacco Exposure on Lung Nodules and Emphysema in a Pilot Silesian Study of Early Lung Cancer with LDCT
Publication -
Retrospective assessment of Lung-RADS® performance in the Silesian Lung Cancer Screening Pilot Study
Publication -
The prognostic role of p53 and its correlation with CDK9 in urothelial carcinoma
Publication -
Longitudinal drug synergy assessment using convolutional neural network image-decoding of glioblastoma single-spheroid cultures
PublicationAbstract Background In recent years, drug combinations have become increasingly popular to improve therapeutic outcomes in various diseases, including difficult to cure cancers such as the brain cancer glioblastoma. Assessing the interaction between drugs over time is critical for predicting drug combination effectiveness and minimizing the risk of therapy resistance. However, as viability readouts of drug combination experiments...
-
Screening of predicted synergistic multi-target therapies in glioblastoma identifies new treatment strategies
PublicationAbstract Background IDH-wildtype glioblastoma (GBM) is a highly malignant primary brain tumor with a median survival of 15 months after standard of care, which highlights the need for improved therapy. Personalized combination therapy has shown to be successful in many other tumor types and could be beneficial for GBM patients. Methods We performed the largest drug combination screen to date in GBM, using a high-throughput effort...
-
Ocena technologii informatycznych z wykorzystaniem prototypu funkcjonalnego systemu agentowego
PublicationW artykule zaprezentowano stan prac nad systemem agentowym służącym ocenie technologii informatycznych. Na obecnym etapie jest to prototyp funkcjonalny obejmujący agenty, bazę wiedzy oraz ontologię, zaś domeną objętą oceną - technologie zarządzania przedsięwzięciami, ze szczególnym uwzględnieniem tych nakierowanych na projekty IT. W tekście, poza wskazaniem oczekiwanych funkcjonalności, główny nacisk położono na weryfikację poprawności...
-
Modele semantyczne wymiany informacji o stanie systemu elektroenergetycznego
PublicationZaprezentowano Common Information Model CIM opracowany w Electric Power Research Institute EPRI w USA. Model ten wypełnia brak uniwersalnego języka opisu topologii i stanu sieci elektroenergetycznej. Stworzony został na potrzeby integracji narzędzi stosowanych przez podmioty sektora elektroenergetycznego. CIM wykorzystuje RDF Schema Definition (RDFS) i RDF. Na tle tego standardu przedstawiono własny zestaw pojęć mapujący meta-ontologię...
-
Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues
PublicationManagement of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...
-
An Approach to the Detection of Bank Robbery Acts Employing Thermal Image Analysis
PublicationA novel approach to the detection of selected security-related events in bank monitoring systems is presented. Thermal camera images are used for the detection of people in difficult lighting conditions. Next, the algorithm analyses movement of objects detected in thermal or standard monitoring cameras using a method evolved from the motion history images algorithm. At the same time, thermal images are analyzed in order to detect...
-
Automatic Analysis of Trajectories of Moving Objects
PublicationOngoing monitoring is essential to providing security and safety of maritime and air operations. This paper presents the research in the area of automatic analysis of movement of unrestricted vehicles like ships and air-planes. The analysis is aimed at extraction of trajectory information, and the results can be used to identify anomalous behaviour in archived and real-time data. In this paper we focus on data acquired using the...
-
Public spaces connecting cities. Green and Blue Infrastructures potential.
PublicationA city fragmentation causes a lot of negative effects in urban environment such as: disconnecting the environmental, functional and compositional relations, a loss of urban compactness, chaotic development, visual chaos, a domination of technical landscape, reduction of security. This is why one of main challenges for urban planners is to connect the fragmented structures by creating friendly, attractive and safe public space....
-
Framework for RIDM within functional safety management process
PublicationThe functional safety management in life cycle is a complex process starting with identifying hazards and defining safety-related functions (SRFs) with risk assessment oriented at determining the safety integrity level. Another element of such life cycle is a verification of required SIL for designed safety-related system which implements safety function. Due to complexity of the problem, to overcome difficulties in safety-related...
-
VISUALIZATION OF SCANTER AND ARPA RADAR DATA IN THE DISTRIBUTED TELEINFORMATION SYSTEM FOR THE BORDER GUARD
PublicationMonitoring of country maritime border is an important task of the Border Guard. This activity can be enhanced with the use of the technology enabling gathering information from distributed sources, processing of that information and its visualization. The paper presents the next stage of development of the STRADAR project (Streaming of real-time data transmission in distributed dispatching and teleinformation systems of the Border...
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublicationDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
Wpływ barier ochronnych na poziom bezpieczeństwa ruchu drogowego
PublicationWypadki drogowe wciąż stanowią znaczną przyczynę zgonów, dlatego bardzo ważnym jest odpowiednie kształtowanie otoczenia drogi – by mogło ono uzyskać miano „wybaczającego”. Artykuł stanowi wprowadzenie do tematyki drogowych barier ochronnych, i jest częścią pracy dyplomowej realizowanej na Politechnice Gdańskiej, w ramach której autorzy analizują zależności pomiędzy wypadkami a omawianymi urządzeniami BRD. W artykule przedstawiono...
-
Semantic memory knowledge acquisition through active dialogues
PublicationSzereg zagadnień językowych nie może zostać rozwiązany bez pamięci semantycznej zawierającej opisy cech obiektów, Automatyczne tworzenie tego rodzaju pamięci jest wielkim wyzwaniem nawet dla prostych obszarów dziedzinowych. Implementacja pamięci semantycznej opartej na reprezentacji wiedzy poprzez powiązania obiektu z jego cechami pokazuje ciekawe zastosowania które nie zostały dotychczas zademonstrowane poprzez bardziej wyszukane...
-
Fenomenologi Husserla a tradycja filozofii transcendentalnej
PublicationCelem tekstu jest opisanie miejsca transcendentalnej fenomenologii Husserla w obrębie pokantowskiej filozofii transcendentalnej.
-
Eye-Gaze Tracking-Based Telepresence System for Videoconferencing
PublicationAn approach to the teleimmersive videoconferencing system enhanced by the pan-tilt-zoom (PTZ) camera, controlled by the eye-gaze tracking system, is presented in this paper. An overview of the existing telepresence systems, especially dedicated to videoconferencing is included. The presented approach is based on the CyberEye eye-gaze tracking system engineered at the Multimedia Systems Department (MSD) of Gdańsk University of Technology...
-
A framework for automatic detection of abandoned luggage in airport terminal
PublicationA framework for automatic detection of events in a video stream transmitted from a monitoring system is presented. The framework is based on the widely used background subtraction and object tracking algorithms. The authors elaborated an algorithm for detection of left and removed objects based on mor-phological processing and edge detection. The event detection algorithm collects and analyzes data of all the moving objects in...
-
Bezpieczeństwo w IP Multimedia Subsystem
PublicationAbstrakt Artykuł jest trzecim w cyklu prac poświęconych IP Multimedia Subsystem (IMS) - po przedstawieniu architektury i usług IMS, odpowiednio w zeszytach 12/2009 oraz 2-3/2011 Przeglądu Telekomunikacyjnego i Wiadomości Telekomunikacyjnych. W obecnym artykule przedstawiono sposoby zapewnienia bezpieczeństwa przy realizacji tych usług.Artykuł został podzielony został na trzy części w których omówiono ogólne wyzwania bezpieczeństwa...