Filters
total: 1435
filtered: 837
-
Catalog
Chosen catalog filters
Search results for: SECURITY ONTOLOGY
-
Performance Analysis of Machine Learning Methods with Class Imbalance Problem in Android Malware Detection
PublicationDue to the exponential rise of mobile technology, a slew of new mobile security concerns has surfaced recently. To address the hazards connected with malware, many approaches have been developed. Signature-based detection is the most widely used approach for detecting Android malware. This approach has the disadvantage of being unable to identify unknown malware. As a result of this issue, machine learning (ML) for detecting malware...
-
Comprehensive thermodynamic analysis of steam storage in a steam cycle in a different regime of work: A zero-dimensional and three-dimensional approach
PublicationDue to the current trends aiming to reduce carbon dioxide emissions by increasing the use of renewable energy sources, changes are required in the operation of coal-fired steam units. The unstable nature of renewable energy sources, depending on weather conditions, means that the amount of energy produced varies and is not always in line with peak demand. To ensure the security and stability of energy supplies in the energy system,...
-
Calibration of acoustic vector sensor based on MEMS microphones for DOA estimation
PublicationA procedure of calibration of a custom 3D acoustic vector sensor (AVS) for the purpose of direction of arrival (DoA) estimation, is presented and validated in the paper. AVS devices working on a p-p principle may be constructed from standard pressure sensors and a signal processing system. However, in order to ensure accurate DoA estimation, each sensor needs to be calibrated. The proposed algorithm divides the calibration process...
-
Amplifying the Randomness of Weak Sources Correlated With Devices
PublicationThe problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...
-
Badanie sieci świadomości sytuacyjnej dla infrastruktury elektroenergetycznej
PublicationWspółczesne systemy elektroenergetyczne są narażone na nowe rodzaje zagrożeń. Są one spowodowane lukami w zabezpieczeniach oraz słabościami architektonicznymi związanymi z szerszym zastosowaniem technologii teleinformatycznych (ICT) w tych systemach. Połączenie sieci elektroenergetycznych z Internetem naraża je na nowego rodzaju niebezpieczeństwa, takie jak ataki APT (ang. Advanced Persistent Threats) lub rozproszona odmowa usługi...
-
Randomness Amplification under Minimal Fundamental Assumptions on the Devices
PublicationRecently, the physically realistic protocol amplifying the randomness of Santha-Vazirani sources producing cryptographically secure random bits was proposed; however, for reasons of practical relevance, the crucial question remained open regarding whether this can be accomplished under the minimal conditions necessary for the task. Namely, is it possible to achieve randomness amplification using only two no-signaling components...
-
Prediction of Pile Shaft Capacity in Tension Based on Some Direct CPT Methods—Vistula Marshland Test Site
PublicationThis paper presents different CPT methodologies for the prediction of the pile shaft resistance in tension on the example of three reference screw piles of the Jazowa test site in Poland. The shaft capacity was estimated based on the cone resistance, sleeve friction and CPT excess pore water pressure. Three piles with diameter 0.4 m and the length varied from 8 m to 14.6 m were subjected to static load tests in tension. Their...
-
Trust and distrust in electoral technologies: what can we learn from the failure of electronic voting in the Netherlands (2006/07)
PublicationThis paper focuses on the complex dynamics of trust and distrust in digital government technologies by approaching the cancellation of machine voting in the Netherlands (2006-07). This case describes how a previously trusted system can collapse, how paradoxical the relationship between trust and distrust is, and how it interacts with adopting and managing electoral technologies. The analysis stresses how, although...
-
Design of experiments approach for ultimate strength assessment of corroded stiffened plates
PublicationThe impact of corrosion degradation on the ultimate strength of stiffened plates subjected to compressive loading is investigated. The DoE technique is used considering different plate and column slenderness ratios and corrosion severity. The FE method, considering geometrical and material nonlinearities, is employed. A two-stage corrosion degradation model is adopted. Firstly, a uniform thickness loss is adopted to reflect the...
-
Effect of Pendolino high-speed rail on the structure of buildings located the proximity of the railway tracks
PublicationThe following research focuses on the dynamic analysis of the impact of the high-speed train inducted vibrations on the structures located near railway tracks. The office complex chosen as the subject of calculations is located in the northern part of Poland, in Gdańsk, in the proximity of Pendolino, the high speed train route. The high speed trains are the response for the growing needs for more efficient railway system. However...
-
The use of GIS tools for road infrastructure safety management
PublicationThere are many factors that influence accidents and their severity. They can be grouped within the system of man, vehicle and environment. The article focuses on how GIS tools can be used to manage road infrastructure safety. To ensure a better understanding and identification of road factors, GIS tools help with the acquisition of road parameter data. Their other role is helping with a clear and effective presentation of risk...
-
Improvement of S355G10+N steel weldability in water environment by Temper Bead Welding
PublicationThe normalized S355G10 + N steel was chosen for testing, it is used in a variety of applications including the building of offshore structures, which may require repairs in water environment. The main aim of the work was to check susceptibility to cold cracking for fillet welds – Controlled Thermal Severity (CTS) tests and butt welds – Tekken tests and in the next step evaluation of effectiveness of Temper Bead Welding (TBW) application...
-
Loudness Scaling Test Based on Categorical Perception
PublicationThe main goal of this research study is focused on creating a method for loudness scaling based on categorical perception. Its main features, such as: way of testing, calibration procedure for securing reliable results, employing natural test stimuli, etc., are described in the paper and assessed against a procedure that uses 1/2-octave bands of noise (LGOB) for the loudness growth estimation. The Mann-Whitney U-test is employed...
-
As causas do trincamento a frio de um ação submetido a soldagem subaquática
PublicationA soldagem subaquàtica usada na confeccao de juntas de acos de alta resistencia aumenta a sua susceptibilidade ao trincamento a frio, um efeito decorrente da transferencia de calor muito mais rapida a partir da area de soldagem e da presenca de hidrogenio difusivel, o que causa aumento da fragilidade do metal. Este trabalho avalia esta propensao ao trincamento a frio do aco S355G10+N usado na construcao de estrururas hidrotecnicas...
-
Transzendentalphilosophie als Geltungsreflexion? Zur Philosophie Heinrich Rickerts
PublicationFilozofie transcendentalną utożsamia się z refleksją o ważności, ale przecież od czasu słynnej debaty między Adolfem Trendelenburgiem i Kuno Fischerem rozwój refleksji transcendentalnej poszedł w dwu kierunkach. W szkole badeńskiej aprioryczna siła transcendentalnego podmiotu przeciwstawia się sferze przedmiotowej redukowanej do czystej faktyczności. Wartość i obiektywizacja poznania jest zasługą transcendentalnej świadomości -...
-
IDENTYFIKACJA CZYNNIKÓW WPŁYWAJĄCYCH NA BEZPIECZEŃSTWO EKSPLOATACJI STATKU NA ŚRÓDLĄDOWEJ DRODZE WODNEJ W DELCIE WISŁY
PublicationKażdego roku w Polsce, na śródlądowych drogach wodnych rejestrowane są przez Urzędy Żeglugi Śródlądowej, Państwową Straż Pożarną i Policję wypadki i incydenty, prowadzące zarówno do uszkodzenia infrastruktury jak i uszczerbku na zdrowiu. Poprawa poziomu bezpieczeństwa wymaga dogłębnej analizy i wyciągania wniosków z zaistniałych sytuacji awaryjnych. Istotną rzeczą jest identyfikacja i usystematyzowanie zagrożeń występujących w...
-
Diamond protection for reusable ZnO coated fiber-optic measurement head in optoelectrochemical investigation of bisphenol A
PublicationDue to the global problem with plastic contaminating the environment, with bisphenol A (BPA) being one of the highest demand, effective monitoring and purification of the pollutants are required. The electrochemical methods constitute a good solution but, due to polymerization of electrochemical oxidation bisphenol A products and their adsorption to the surfaces, measurement head elements are clogged by the formed film. In this...
-
Weldability of Underwater Wet-Welded HSLA Steel: Effects of Electrode Hydrophobic Coatings
PublicationThe paper presents the effects of waterproof coatings use to cover electrodes on the weldability of high-strength, low-alloy (HSLA) steel in water. With the aim of improving the weldability of S460N HSLA steel in water, modifications of welding filler material were chosen. The surfaces of electrodes were covered by different hydrophobic substances. The aim of the controlled thermal severity (CTS) test was to check the influence...
-
Fluid–Structure Interaction methods for the progressive anatomical and artificial aortic valve stenosis
PublicationCardiovascular system diseases, as aortic valve stenosis, are the main cause of mortality and morbidity among patients. There is still a room for enhancement of the diagnostic and therapeutic procedures, which will lead to improvement of the treatment. One of the remedies are the computer tools to support the medical diagnoses and prostheses design. The development of a procedure for modeling the aortic valves: anatomical tricuspid...
-
Improved RSS-Based DoA Estimation Accuracy in Low-Profile ESPAR Antenna Using SVM Approach
PublicationIn this paper, we have shown how the overall performance of direction-of-arrival (DoA) estimation using lowprofile electronically steerable parasitic array radiator (ESPAR) antenna, which has been proposed for Internet of Things (IoT) applications, can significantly be improved when support vector machine (SVM) approach is applied. Because the SVM-based DoA estimation method used herein relies solely...
-
Protection System Design of Induction Motor for Industries
PublicationThe fundamental and durable structures of induction motor, as well as their low manufacturing cost, make them popular components in a wide range of current applications. Providing a safety net for employees is a must-have for businesses. This project’s motivation for improvement is to provide industrial motors, lift motors, pumps, and so on with safety. An induction motor’s primary goal is to protect it from problems, such as...
-
Protection System Design of Induction Motor for Industries
PublicationThe fundamental and durable structures of induction motor, as well as their low manufacturing cost, make them popular components in a wide range of current applications. Providing a safety net for employees is a must-have for businesses. This project’s motivation for improvement is to provide industrial motors, lift motors, pumps, and so on with safety. An induction motor’s primary goal is to protect it from problems, such as...
-
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublicationCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...
-
Edible dragonflies and damselflies (order Odonata) as human food – A comprehensive review
PublicationThe rapid growth of the human population leads to a big concern about the food y and demand worldwide. However, due to the reduction in global arable land area, humans need to find alternative food sources to fulfil their needs. Consequently, edible insects have been identified as a promising solution to ameliorate food security and increase global nutrition. Among more than 2,100 identified edible insect species, dragonflies and...
-
A Simple Neural Network for Collision Detection of Collaborative Robots
PublicationDue to the epidemic threat, more and more companies decide to automate their production lines. Given the lack of adequate security or space, in most cases, such companies cannot use classic production robots. The solution to this problem is the use of collaborative robots (cobots). However, the required equipment (force sensors) or alternative methods of detecting a threat to humans are usually quite expensive. The article presents...
-
Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection
PublicationAs a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used method for identifying Android malware is signature-based detection. The drawback of this method, however, is that it is unable to detect unknown malware. As a consequence of this problem,...
-
Audio content analysis in the urban area telemonitoring system
PublicationArtykuł przedstawia możliwości rozwinięcie monitoringu miejskiego o automatyczną analizę dźwięku. Przedstawiono metody parametryzacji dźwięku, które możliwe są do zastosowania w takim systemie oraz omówiono aspekty techniczne implementacji. W kolejnej części przedstawiono system decyzyjny oparty na drzewach zastosowany w systemie. System ten rozpoznaje dźwięki niebezpieczne (strzał, rozbita szyba, krzyk) wśród dźwięków zarejestrowanych...
-
Automatic recognition of males and females among web browser users based on behavioural patterns of peripherals usage
PublicationPurpose The purpose of this paper is to answer the question whether it is possible to recognise the gender of a web browser user on the basis of keystroke dynamics and mouse movements. Design/methodology/approach An experiment was organised in order to track mouse and keyboard usage using a special web browser plug-in. After collecting the data, a number of parameters describing the users’ keystrokes, mouse movements and clicks...
-
Badania i możliwości adaptacji ruin kościoła we Wocławach
PublicationW artykule opisano wyniki badań ruin kościoła z XIV w. we Wocławach. Przedstawiono też problem adaptacji ruin obiektów sakralnych, możliwości zagospodarowania oraz możliwe warianty odbudowy ruin. Po wojnie trzynastoletniej kościół został rozbudowany o nawy boczne i wieżę. Układ świątyni został zredukowany w czasie odbudowy po pożarze w XVIII w. W czasie II wojny światowej kościół został zniszczony. Do dziś nie został odbudowany...
-
Emotional distress, burnout and sense of safety during the COVID-19 pandemic in teachers after the reopening of schools
PublicationThe COVID-19 pandemic is having a significant impact on people's psychological well-being and mental health. This study aimed to identify factors linked to emotional distress, burnout and sense of safety in teachers related to the reopening of Polish schools after lockdown, remote work, and the holiday period between March and August 2020. A total of 1,286 teachers from different educational institutions participated in the...
-
Advanced numerical modelling for predicting residual compressive strength of corroded stiffened plates
PublicationAn advanced methodology for predicting the residual compressive strength of corroded stiffened plates is developed here using the non-linear finite element method. The non-uniform loss of a plate thickness is accounted for on a macro-scale. In contrast, mechanical properties are changed using the constitutive model to reflect the corrosion degradation impact on a micro-scale. Three different stiffened plate thicknesses are considered,...
-
Optimization of Stabilizing Systems in Protection of Cultural Heritage: The Case of the Historical Retaining Wall in the Wisłoujście Fortress
PublicationThe aim of the paper is to propose new quantitative criteria for selecting the optimal method of securing and repairing a historical object, which take into account Structural, Conservation and Architectural aspects (the S–C–A method). Construction works on cultural heritage sites tend to be challenging and require an interdisciplinary approach. Therefore, they are strictly related to the philosophy of sustainable development which...
-
Analizy ilości i jakości odpływu wód deszczowych i roztopowych z kontrolowanej zlewni zurbanizowanej
PublicationIstotnym problemem Gdańska staje się bezpieczeństwo ekologiczne związane ze spływami miejskimi odprowadzanymi bezpośrednio do wód powierzchniowych, często akwenów użyteczności publicznej. W latach 2011÷2013, Katedra Hydrotechniki Wydziału Inżynierii Lądowej i Środowiska Politechniki Gdańskiej, we współpracy z Wojewódzkim Funduszem Ochrony Środowiska i Gospodarki Wodnej w Gdańsku oraz Gdańskimi Melioracjami, podjęła się wdrożenia...
-
RSS-Based DoA Estimation Using ESPAR Antenna for V2X Applications in 802.11p Frequency Band
PublicationIn this paper, we have proposed direction-of arrival (DoA) estimation of incoming signals for V2X applications in 802. 11p frequency band, based on recording of received signal strength (RSS) at electronically steerable parasitic array radiator (ESPAR) antenna's output port. The motivation of the work was to prove that ESPAR antenna used to increase connectivity and security in V2X communication can...
-
Technological solutions to landfill management: Towards recovery of biomethane and carbon neutrality
PublicationInadequate landfill management poses risks to the environment and human health, necessitating action. Poorly designed and operated landfills release harmful gases, contaminate water, and deplete resources. Aligning landfill management with the Sustainable Development Goals (SDGs) reveals its crucial role in achieving various targets. Urgent transformation of landfill practices is necessary to address challenges like climate change,...
-
Art and Healthcare - Healing Potential of Artistic Interventions in Medical Settings
PublicationThe stereotype of a machine for healing seems to be well rooted in common thinking and social perception of hospital buildings. The technological aspect of healthcare architecture has been influenced for several years by three major factors. The first is linked to the necessity of providing safety and security in the environment of elevated epidemiological risk. The second concerns the need for incorporating advanced technology...
-
Information-driven network resilience: Research challenges and perspectives
PublicationInternet designed over 40 years ago was originally focused on host-to-host message delivery in a best-effort manner. However, introduction of new applications over the years have brought about new requirements related with throughput, scalability, mobility, security, connectivity, and availability among others. Additionally, convergence of telecommunications, media, and information technology was responsible for transformation...
-
Sensors for Rapid Detection of Environmental Toxicity in Blood of Poisoned People
PublicationRecently, the diagnosis and treatment of poisoned person can be done only in specialized centers. Furthermore, currently used clinical methods of intoxication diagnosis are not sufficient for early detection. Conventional laboratory tests based on urine and blood require professional, high skilled staff, high cost equipment as well as they are arduous and lasting analytical procedures. There is a need to elaborate relatively cheap...
-
Labeler-hot Detection of EEG Epileptic Transients
PublicationPreventing early progression of epilepsy and sothe severity of seizures requires effective diagnosis. Epileptictransients indicate the ability to develop seizures but humansoverlook such brief events in an electroencephalogram (EEG)what compromises patient treatment. Traditionally, trainingof the EEG event detection algorithms has relied on groundtruth labels, obtained from the consensus...
-
Molecular targets for antifungals in amino acid and protein biosynthetic pathways
PublicationFungi cause death of over 1.5 million people every year, while cutaneous mycoses are among the most common infections in the world. Mycoses vary greatly in severity, there are long-term skin (ringworm), nail or hair infections (tinea capitis), recurrent like vaginal candidiasis or severe, life-threatening systemic, multiorgan infections. In the last few years, increasing importance is attached to the health and economic problems...
-
Including the Dark Side of Entrepreneurship in the Entrepreneurship Education
PublicationPursuing an entrepreneurial career is often rewarding in terms of both economic and psychological outcomes. However, becoming an entrepreneur also has its darker side that affects professional and personal life. Meanwhile, the positivity bias is prevalent in entrepreneurial education and research. It is recognized as emphasizing the advantages of becoming an entrepreneur and giving considerably less attention to potential downsides....
-
Development and validation of a model that includes two ultrasound parameters and the plasma D-dimer level for predicting malignancy in adnexal masses: an observational study
PublicationBackground: Pre-operative discrimination of malignant from benign adnexal masses is crucial for planning additional imaging, preparation, surgery and postoperative care. This study aimed to define key ultrasound and clinical variables and develop a predictive model for calculating preoperative ovarian tumor malignancy risk in a gynecologic oncology referral center. We compared our model to a subjective ultrasound assessment (SUA)...
-
Accuracy of Pretreatment Ultrasonography Assessment of Intra-Abdominal Spread in Epithelial Ovarian Cancer: A Prospective Study
PublicationThe aim of this study was to test the accuracy of ultrasonography performed by gynecological oncologists for the preoperative assessment of epithelial ovarian cancer (EOC) spread in the pelvis and abdominal cavity. A prospective, observational cohort study was performed at a single tertiary cancer care unit. Patients with suspected EOC were recruited and underwent comprehensive transvaginal and abdominal ultrasonography performed...
-
Analysis of road accident causes in the voivodships in the years 2014-2021 in the aspect of socio-economic costs – towards the implementation of sustainable development
PublicationThe article addresses the topic of road safety. The objective of the research was to assess road accidents caused by voivodships. The analysis took account of the socio-economic differences in the voivodships, which deter-mine the unit costs of fatalities and injuries. A descriptive analysis is given to show the dynamics of changes in the years 2014-2021 in the voivodships and how different factors influenced change. The article...
-
Assessment of the Speed Management Impact on Road Traffic Safety on the Sections of Motorways and Expressways Using Simulation Methods
PublicationMethods used to evaluate the impact of Intelligent Transport System (ITS) services on road safety are usually based on expert assessments or statistical studies. However, commonly used methods are challenging to apply in the planning process of ITS services. This paper presents the methodology of research using surrogate safety measures calculated and calibrated with the use of simulation techniques and a driving simulator. This...
-
Advantages of the Application of the Temper Bead Welding Technique During Wet Welding
PublicationThermo-mechanically rolled S460ML steel was chosen for welding in underwater wet welding conditions by covered electrodes. The main aim of this study was to check the weldability for fillet welds in a water environment by controlled thermal severity (CTS) tests and to check the influence of temper bead welding (TBW) on the weldability of the investigated steel. Non-destructive and destructive tests showed that S460ML steel has...
-
Functional safety and managing competence
PublicationSą nowe wyzwania związane z badaniami, edukacją i szkoleniem w obszarach bezpieczeństwa i ochrony systemów i sieci krytycznych. W rozdziale podkreśla się, że kompetencje specjalistów powinny być kształtowane w zintegrowanych procesach edukacji i szkolenia. Dlatego uzasadnione jest, aby opracować w Europie standardy i programy kształcenia na bazie odpowiednich prac badawczych i najlepszych doświadczeń z praktyki przemysłowej w celu...
-
Renewable Energy in the Pomerania Voivodeship—Institutional, Economic, Environmental and Physical Aspects in Light of EU Energy Transformation
PublicationIn the era of globalization and rapid economic growth, affecting most world economies, increased production and consumption are leading to higher levels of energy production and consumption. The growing demand for energy means that energy resources from conventional sources are not sufficient; moreover, its production generates high costs and contributes to the emission of greenhouse gases and waste. In view of the above, many...
-
Autonomous port management based AGV path planning and optimization via an ensemble reinforcement learning framework
PublicationThe rapid development of shipping trade pushes automated container terminals toward the direction of intelligence, safety and efficiency. In particular, the formulation of AGV scheduling tasks and the safety and stability of transportation path is an important part of port operation and management, and it is one of the basic tasks to build an intelligent port. Existing research mainly focuses on collaborative operation between...
-
The Russian Federation in European Union Programmes
PublicationSince the early 1990s, the European Union has been supporting socio-economic transformations in the former Soviet Union states, including the Russian Federation. Initially, this assistance was provided in the framework of the TACIS Programme, offering long-term, non-repayable aid. In 1991–2006 Russia received EUR 2.7bn for the restructuring of the state enterprise sector, establishment of private companies, state administration...