Search results for: CBRN DEFENSE - Bridge of Knowledge

Search

Search results for: CBRN DEFENSE

Filters

total: 745
filtered: 606

clear all filters


Chosen catalog filters

  • Category

  • Year

  • Options

clear Chosen catalog filters disabled

Search results for: CBRN DEFENSE

  • ARRIERE-GARDE IN ARCHITECTURE, AS A RESPONSE TO POST-POSTMODERN REALITY

    Publication

    - Year 2016

    The article presents a general discussion on the direction of contemporary architecture. We can freely speak that postmodernity, understood in its philosophical core as a search for meaning in architecture, as a strategy of building our environment is over. What comes next? Some say, from lack of better naming, that we live in post-postmodern times. Term post-postmodernity is a call for new strategy of shaping our societies and...

    Full text to download in external service

  • Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures

    Publication

    In IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...

    Full text available to download

  • Static puncture tests of geotextiles and geotextile - related prodcts

    Publication

    - Year 2003

    W artykule omówiono dwa rodzaje przebicia statycznego geotekstyliów i wyrobów pokrewnych: standardowe badanie CBR zgodnie z normą EN ISO 12236 i nowe metody opracowywane przez CEN TC 189 w ramach projektu normy PrEN 189066. Procedury wykonywania badań są podobne, różnią się: tłokiem obciążającym, metodą podparcia materiału, wypełnieniem cylindra oraz zastosowanym materiałem geosyntetycznym.

  • Modele i algorytmy dla grafowych struktur defensywnych

    Publication

    - Year 2023

    W niniejszej pracy przeprowadzono analizę złożoności istnienia struktur defensywnych oraz równowag strategicznych w grafach. W przypadku struktur defensywnych badano modele koalicji defensywnych, zbiorów defensywnych i koalicji krawędziowych – każdy z nich w wersji globalnej, tj. z wymogiem dominacji całego grafu. W przypadku modeli równowagi strategicznej badano równowagę strategiczną koalicji defensywnych, równowagę strategiczną...

    Full text available to download

  • Software Agents for Computer Network Security

    Publication

    - Year 2012

    The chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...

    Full text to download in external service

  • Ground-based, Hyperbolic Radiolocation System with Spread Spectrum Signal - AEGIR

    The most popular radiolocation systems in the world (at present), is the American GPS (Global Positioning System). It is managed by the Department of Defense and there is always the possibility of the occasional inaccuracies or deliberate introduction of errors that prevent its use by the special services or armies of other countries than the U.S.A. This situation has spawned the need to develop an autonomous, ground-based radiolocation...

  • Ekspertyza naukowo-techniczna dotyczącą wybranych parametrów geowłóknin Elcen

    Publication

    - Year 2015

    Przedmiotem ekspertyzy były badania parametrów fizycznych, wytrzymałościowych i hydraulicznych geowłóknin o symbolach: 150, 200, 300, 400, 500 i 600. W ramach prac badawczych określono następujące parametry techniczne: - masa powierzchniowa, - grubość pod obciążeniem: 2, 20 i 200 kPa, - wytrzymałość na rozciąganie i wydłużenie względne (metodą szerokich próbek), - siła przy przebiciu statycznym (metodą CBR), - charakterystyczna...

  • Zastosowanie wybranych metod sztucznej inteligencji do wspomagania projektowania wstępnego statku

    Publication

    - Year 2009

    W pracy przedstawiono hybrydowy system wspomagania projektowania statku oparty na metodologii CBR z wykorzystaniem wybranych narzędzi sztucznej inteligencji, takich jak: system ekspertowy Exsys Developer wraz z logiką rozmytą, relacyjna baza danych Access oraz sztuczna sieć neuronowa ze wsteczną propagacją błędów. System przewidziany jest do wspomagania projektowania wstępnego statku, w którym najczęściej wykorzystuje się projekty...

  • Influence of Flat Lapping Kinematics on Machinability of Ceramics

    Publication

    New tools for flat grinding of ceramics are presented in the paper. Electroplated CBN tools (B64 and B107) were used in a modified single-disc lapping machine configuration. The results from experiments, such as the material removal rate and surface roughness parameters are presented and analyzed. Numerical simulations, based on the model for the shape error and tool wear estimation in machining with flat lapping kinematics, are...

    Full text to download in external service

  • Establishing Relationships between Parameters of the controlled Compaction Soil by Using Various In-Situ Tests

    Publication

    - Year 2017

    The aim of research was evaluating reliable correlations between chosen soil parameters describing state of surface layers of soil. The paper presents site comparative tests based on the light falling weight deflectometer (LFWD), the static plate load tester (VSS), the dynamic probing light tester (DPL) and the bearing ratio tester (CBR in-situ) with relationships between soil state parameters. All featured in-situ...

    Full text available to download

  • Traffic Remapping Attacks in Ad Hoc Networks

    Publication

    - IEEE COMMUNICATIONS MAGAZINE - Year 2018

    Ad hoc networks rely on the mutual cooperation of stations. As such, they are susceptible to selfish attacks that abuse network mechanisms. Class-based QoS provisioning mechanisms, such as the EDCA function of IEEE 802.11, are particularly prone to traffic remapping attacks, which may bring an attacker better QoS without exposing it to easy detection. Such attacks have been studied in wireless LANs, whereas their impact in multihop...

    Full text available to download

  • Assessing Roadside Hybrid Energy Absorbers Using the Example of SafeEnd

    Publication

    A combination of crash cushion and end-terminal, hybrid energy absorbing devices have been in use worldwide for a few years already. They include SafeEnd, a system Poland has recently introduced. Some road authorities have raised concerns as regards the operating conditions of the devices and how they work together with safety barriers. The objective of this research is to clarify the concerns and answer the following questions:...

    Full text available to download

  • The Caucasian flora: a still-to-be-discovered rich source of antioxidants

    Publication

    - FREE RADICAL RESEARCH - Year 2019

    Cellular redox homeostasis is a state of balance between the formation of Usually Reactive Oxygen and / or Nitrogen Species (ROS/RNS), endogenous antioxidant defence systems, and exogenous dietary antioxidants. The disturbance of redox homeostasis, by the overproduction of endogenous ROS/RNS, may increase the risk of development of so-called civilisation diseases. The solution seems to be either the increased production of endogenous...

    Full text available to download

  • Cybersecurity in the Electricity Sector

    Publication

    - Year 2019

    This book offers a systematic explanation of cybersecurity protection of electricity supply facilities, including discussion of related costs, relevant standards, and recent solutions. The author explains the current state of cybersecurity in the electricity market, and cybersecurity standards that apply in that sector. He then offers a systematic approach to cybersecurity management, including new methods of cybersecurity assessment,...

    Full text to download in external service

  • Mechanical Behavior of Plastic Strips-Reinforced Expansive Soils Stabilized with Waste Marble Dust

    Publication

    Expansive soil needs to undergo treatment to be used as safe foundation soil for roads and buildings. From environmental conservation and economical point of view, the usage of agricultural and industrial wastes is the best option. In this study, the effects of utilizing plastic waste and marble waste dust on the engineering properties of expansive soils were examined. Various laboratory tests were carried out on sampled expansive...

    Full text to download in external service

  • Mechanical Behavior of Plastic Strips-Reinforced Expansive Soils Stabilized with Waste Marble Dust

    Publication

    Expansive soil needs to undergo treatment to be used as safe foundation soil for roads and buildings. From an environmental conservation and economical point of view, the usage of agricultural and industrial wastes is the best option. In this study, the effects of utilizing plastic waste and marble waste dust on the engineering properties of expansive soils were examined. Various laboratory tests were carried out on sampled expansive...

    Full text available to download

  • Modeling the application of steel slag in stabilizing expansive soil

    Publication

    The objective of this study was to evaluate the suitability of steel slag as an additive to the engineering properties of weak clay soil. Different geotechnical laboratory tests were conducted on both stabilized and natural soils. Steel slag (SS) was added at a rate of 0, 5, 10, 15, 20, and 25% to the soil. Specific gravity, grain size analysis, Atterberg limit test, compaction test, free swell, California bearing ratio (CBR),...

    Full text available to download

  • Efekty egoistycznych ataków na poziomie mac w sieciach ad hoc o topologii wieloskokowej

    Stacje sieci ad hoc mogą manipulować parametrami dostępu do medium transmisyjnego dla osiągnięcia nienależnie wysokiej jakości usług. Dla środowiska sieci ad hoc o topologii wieloskokowej rozważane są ataki na mechanizmy odłożenia transmisji i klasyfikacji ruchu, przeprowadzane zarówno w stosunku do przepływów źródłowych jak i tranzytowych. Wyniki pozwalają wstępnie ocenić efekty takich ataków oraz skuteczność mechanizmów obronnych.

  • Rozproszona automatyka SZR w sieciach rozdzielczych średniego napięcia zgodnych z IEC 61850

    Nowe możliwości w realizacji automatyki zabezpieczeniowej wnoszą wymagania normy IEC 61850 (PN-EN 61850) publikowanej od roku 2002 - do chwili obecnej. Zasadniczym celem standardu 61850 jest zapewnienie kompatybilności urządzeń pochodzących od różnych producentów. W artykulke przedstawiono najnowsze wymagania dotyczące czasów rekonfiguracji komunikacji po jej fizycznym przerwaniu. Zaproponowano wielopierścieniową topologię i protokół...

    Full text to download in external service

  • HPLC-coupled post-column derivatization aims at characterization and monitoring of plant phytocomplexes, not at assessing their biological properties

    Two recent decades of research identified a number of environmental factors as well as mechanisms leading to pathogenic processes in the human organism. A common factor in pathogenesis of many diseases is oxidative stress, a condition in which the production of damaging reactive oxygen species (ROS), present in the body as an inevitable consequence of respiration and exacerbated by the inflammatory response and by exogenous factors...

    Full text available to download

  • Integrating heterogeneous systems with high-dependability requirements by means of web services

    Publication

    - Year 2012

    Web services are commonly used on boundaries of heterogeneous components in Service Oriented Architecture (SOA) as they provide a universal communication channel not bound to any particular programming language or run-time platform. This paper describes how web services can be used to integrate heterogeneous systems which serve purposes requiring high dependability, reliability and availability. Examples of such systems include...

  • Global edge alliances in graphs

    In the paper we introduce and study a new problem of finding a minimum global edge alliance in a graph which is related to the global defensive alliance (Haynes et al., 2013; Hedetniemi, 2004) and the global defensive set (Lewoń et al., 2016). We proved the NP-completeness of the global edge alliance problem for subcubic graphs and we constructed polynomial time algorithms for trees. We found the exact values of the size of the...

    Full text available to download

  • Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs

    Publication

    - IEEE COMMUNICATIONS LETTERS - Year 2017

    In ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...

    Full text available to download

  • Fake VIP Attacks and Their Mitigation via Double-Blind Reputation

    Publication

    - Year 2017

    In a generic setting subsuming communication networks, resource sharing systems, and multi-agent communities, a client generates objects of various classes carrying class-dependent signatures, to which a server assigns class-dependent service quality. A Fake VIP attack consists in false declaration of a high class, with an awareness that detection of object signature at the server side is costly and so invoked reluctantly. We show...

    Full text available to download

  • Sensors and Sensor’s Fusion in Autonomous Vehicles

    Publication

    - SENSORS - Year 2021

    Autonomous vehicle navigation has been at the center of several major developments, both in civilian and defense applications. New technologies such as multisensory data fusion, big data processing, and deep learning are changing the quality of areas of applications, improving the sensors and systems used. New ideas such as 3D radar, 3D sonar, LiDAR, and others are based on autonomous vehicle revolutionary development. The Special...

    Full text available to download

  • Model zarządzania projektami informatycznymi w jednostkach sądownictwa powszechnego w Polsce

    Publication

    - Year 2023

    Projekty mają istotny wpływ na funkcjonowanie sądów powszechnych. Przyjrzenie się projektom informatycznym realizowanym w sądach wraz z raportem Najwyższej Izby Kontroli dot. sprawności realizowanych projektów informatycznych wymiaru sprawiedliwości doprowadziło do zidentyfikowania głównych problemów podczas realizacji inicjatyw informatycznych. Ponadto przegląd literatury dotyczący zarządzania projektami dla wymiaru sprawiedliwości...

    Full text available to download

  • Zastosowanie metodologii wnioskowania z bazy przypadków w tworzeniu atrakcyjnych witryn biznesowych

    Publication

    - Year 2006

    Przedstawiono podstawowe założenia metodologii wnioskowania z bazy przypadków (ang. Case Based Reasoning). Zaakcentowano możliwości jej wykorzystania w sytuacjach, gdy zawodzą metody o charakterzetypowo analitycznym. Zaproponowano zastosowanie CBR dla uatrakcyjnie-nia biznesowych witryn internetowych w sektorze handlowo-usługowym, a w szczególności dla obsługi niekompletnie sprecyzowanych wymagań stawianych przez klientów. Podano...

  • Temperature influence on tyre/road noise on poroelastic road surface based on laboratory measurements

    Publication

    The temperature effect on measured tyre/road noise is very important phenomena as it may lead to significant errors in measurement results due to substantial influence of this parameter on the obtained values. It depends mainly on the particular tyre-road combination. It is different for dense and porous as well as for bituminous and cement concrete pavements. It differs also depending on tested tyre. The correction procedure for...

    Full text available to download

  • Chronic Rhinosinusitis—Microbiological Etiology, Potential Genetic Markers, and Diagnosis

    Publication

    Chronic rhinosinusitis (CRS) is a significant public health problem. Bacterial colonization and impaired mucociliary clearance play a significant role in the inflammatory process. Several inflammatory pathways and host defense elements are altered in CRS, which may contribute to observed differences in the microbiome. To date, researching CRS has been difficult due to limited access to the studied tissue and a lack of available...

    Full text available to download

  • Trustworthiness and Subversion in Large Service- Oriented Multi-Agent Systems under Virtual Anonymity and Blind Provider Selection

    Publication

    - Year 2023

    To promote honest service provision in multi-agent systems, a Computational Trustworthiness and Rating scheme collects service ratings and computes agents' trustworthiness levels (TLs). Studies of existing schemes fail to reflect closed-loop dynamics of TLs arising from the mutual influence of agents' behavior and TLs, and to capture relevant properties. Recent simulative and analytical models produce results tied to a particular...

    Full text to download in external service

  • ANALYSIS OF BEARING CLEARANCE AND WIDTH OF OIL GROOVE ON CHARACTERISTIC OF FLUID FILM IN HYDRODYNAMIC MAIN CRANKSHAFT BEARINGS

    Publication

    Abstract Paper represents analysis of influence of oil groove width and bearing clearance on characteristics of oil film in hydrodynamic journal main crankshaft bearing. Analysis was performed in purpose to define influence of bearing clearance and dimensions of oil groove on static characteristics and manufacturability of half shelf bearings in industrial high-volume production. Computer simulations was made using ARTbear program...

    Full text available to download

  • Wybieranie prezentu na podstawie wnioskowania z bazy przypadków.

    Publication

    Przedstawiono koncepcję i poszczególne kroki projektowania systemu informatycznego doradzającego użytkownikowi wybranie odpowiedniego prezentu okolicznościowego. Na tle rozważań o efektywności komputerowych systemów doradczych zostało uzasadnione przyjęcie metodologii wnioskowania z bazy przypadków (CBR) jako podstawowej koncepcji systemu. Następnie omówiono strukturę bazy przypadków i cykl wnioskowania w tego typu systemach. Pracę...

  • Influence of grain shape on the mechanical behaviour of granular materials

    Publication

    - Year 2009

    We performed series of numerical vertical compression tests on assemblies of 2D granular material using a Discrete Element code and studied the results in regard to the grain shape. The samples consist of 5000 grains made either of 3 overlapping discs (clump - grain with concavities) or of six-edged polygons (convex grain). These two types of grains have a similar external envelope, ruled with a geometrical parameter α. In the...

    Full text to download in external service

  • Automated Diagnostics of Current Pick-Up Disturbances in Electric Traction Networks

    Publication

    - Year 2014

    The present work defines the basic causes of bow disturbances of current pick-up, sets a task of establishing a system of automated control of bow disturbances at feeder zones of electric traction networks, proposes structural variants of the technical system implementation, describes the algorithm of detection of bow disturbances of current pick-up.

  • Management Information Base module for electrical power system configuration and use

    Publication

    - Year 2012

    Internet standards describe a virtual information store, termed the Management Information Base (MIB), which is made available through Simple Network Management Protocol (SNMP). No standard MIB exists to date for monitoring power lines in facilities over IP network. This paper defines a subset of the MIB for power system monitoring.

    Full text to download in external service

  • Kinedynamics of Spherical Wavefields in Fluid and Dielectric Continua

    Publication

    - Year 2016

    Distubances induced by physical sources in fluids or dielectrics maintain their primary character while propagating throughout either of these bi-dynamic continua. The paper defines and illustrates four sets of bi-fields based on four specific fundamental kinedynamic solutions to inhomogeneous wave equations related to quasi-point acoustic and electromagnetic sources.

  • Influence of pore formers on electrical properties of CaTi0.9Fe0.1O3-δ perovskite-type ceramics

    Publication

    Porous CaTi0.9Fe0.1O3-δ (CTF) perovskites were synthesized by the standard solid state method at different sintering temperatures with carbon black (CB), corn starch (CS) and potato starch (PS) as pore-forming agents. The ceramic samples of porosity between 9% and 42% with 5 - 40 μm pore sizes, were obtained by a 6 h sintering at either 1130º C or 1200º C of precursor powder prepared at 1470º C. X-ray diffraction analysis proved...

    Full text available to download

  • A New Approach to Assess Quality of Motion in Functional Task of Upper Limb in Duchenne Muscular Dystrophy

    Publication

    - Applied Sciences-Basel - Year 2022

    (1) Background: This study presents a new method for the motion quantitative analysis of Duchenne muscular dystrophy patients (DMD) performing functional tasks in clinical conditions. (2) Methods: An experimental study was designed to define how different levels of external mass (light and heavy) influence the performance of the upper limbs of a tested DMD and reference subject (RS) during horizontal movements (level of the waist)...

    Full text available to download

  • Composition Patterns of Contemporary Polish Residential Building Facades

    This study aims to define the types of composition patterns of contemporary Polish multi-family building facades. The authors define the compositional patterns to determine their frequency. Analyses carried out on the basis of photos and visualizations of 113 examples of architecture from Poland identified groups of common features of facades. Statistical analyses of these features resulted in six types of compositions. Clear differences...

    Full text to download in external service

  • Barriers of Cross-cultural Interactions According to the Research Findings

    Publication
    • M. Rozkwitalska

    - Journal of Intercultural Management - Year 2010

    The aim of this article is to label major cultural barriers and to present results of empiricalfindings referring to barriers to intercultural interactions in foreign subsidiaries oftransnational corporations (TNCs). The qualitative research was conducted in TNCs'foreign subsidiaries operating in Poland in the winter of 2009/2010. The articledescribes how the respondents perceived the problems in cooperation with foreigners,defines...

    Full text available to download

  • Inspired by Nature: The Use of Plant-derived Substrate/Enzyme Combinations to Generate Antimicrobial Activity in situ

    Publication

    - Natural Product Communications - Year 2015

    The last decade has witnessed a renewed interest in antimicrobial agents. Plants have received particular attention and frequently rely on the spontaneous enzymatic conversion of an inactive precursor to an active agent. Such two-component substrate/enzyme defence systems can be reconstituted ex vivo. Here, the alliin/alliinase system from garlic seems to be rather effective against Saccharomyces cerevisiae, whilst the glucosinolate/myrosinase...

    Full text available to download

  • VISUALIZATION OF SCANTER AND ARPA RADAR DATA IN THE DISTRIBUTED TELEINFORMATION SYSTEM FOR THE BORDER GUARD

    Monitoring of country maritime border is an important task of the Border Guard. This activity can be enhanced with the use of the technology enabling gathering information from distributed sources, processing of that information and its visualization. The paper presents the next stage of development of the STRADAR project (Streaming of real-time data transmission in distributed dispatching and teleinformation systems of the Border...

    Full text available to download

  • Calculation of motion trajectory and geometric parameters of the trawl during pelagic fishing

    This paper presents a mathematical model of the mass centre motion trajectory of the trawl, its main geometrical parameters, way of solving the model as well as its example results. It could be useful to define optimum parameters of safe, effective and environmentally friendly pelagic fishing.

    Full text available to download

  • On constitutive modeling for technical woven fabric

    Publication

    W pracy przestawiono kilka modeli konstytutywnych przyjmowanych do opisu zachowania się tkanin technicznych. Oprócz modeli zaczerpniętych z literatury autorzy prezentują własną koncepcje modelu stanowiąca rozszerzenie modelu sieci gęstej.This paper describes several types of the constitutive models used for the technical woven fabric description. Besides of the literatures examples of the constitutive models, the authors presented...

  • Generalization of Phylogenetic Matching Metrics with Experimental Tests of Practical Advantages

    Publication

    - JOURNAL OF COMPUTATIONAL BIOLOGY - Year 2023

    The ability to quantify a dissimilarity of different phylogenetic trees is required in various types of phylogenetic studies, for example, such metrics are used to assess the quality of phylogeny construction methods and to define optimization criteria in supertree building algorithms. In this article, starting from the already described concept of matching metrics, we define three new metrics for rooted phylogenetic trees. One...

    Full text available to download

  • Polygons vs. clumps of discs: A numerical study of the influence of grain shape on the mechanical behaviour of granular materials

    Publication

    - POWDER TECHNOLOGY - Year 2011

    We performed a series of numerical vertical compression tests on assemblies 01 20 granular material using a Discrete Element code and studied the results with regard to the grain shape. The samples consist of 5000 grains made from either 3 overlapping discs (clumps - grains with concavities) or six-edged polygons (convex grains). These two grain type have similar external envelope, which is a fund ion of a geometrical parameter...

    Full text to download in external service

  • Cyanogenic Compounds and Estrogen Disruptors

    Publication

    Balanced diet consists largely of plants containing cyanogenic compounds in the form of the more common cyanogenic glycosides and sometimes lipids. Maize, wheat, rye, apples, barley, oats, sugar cane and yet many other plants consumed by humans contain cyanogenic compounds. However the risk of poisoning is negligible as it is very easy to remove the toxic HCN by grinding and drying in air or soaking in water and an additional...

    Full text to download in external service

  • Green function diagonal for a class of heat equations

    A construction of the heat kernel diagonal is considered as element of generalized zeta function theory, which gradient at the origin defines determinant of a differential operator in a technique for regularizing quadratic path integral. Some classes of explicit expressions of the Green function in the case of finite-gap potential coefficient of the heat equation are constructed. An algorithm and program for Mathematica are presented...

    Full text to download in external service

  • Comparing Phylogenetic Trees by Matching Nodes Using the Transfer Distance Between Partitions

    Publication

    - JOURNAL OF COMPUTATIONAL BIOLOGY - Year 2017

    Ability to quantify dissimilarity of different phylogenetic trees describing the relationship between the same group of taxa is required in various types of phylogenetic studies. For example, such metrics are used to assess the quality of phylogeny construction methods, to define optimization criteria in supertree building algorithms, or to find horizontal gene transfer (HGT) events. Among the set of metrics described so far in...

    Full text to download in external service

  • Redevelopment of Russian closed towns: The Example of Zato "Zvezdniy"

    The current economic crisis is having a strong impact on socio-economic processes in the development of Russian cities. The impact of the crisis is particularly strong on city territory where the activity of core industrial enterprises, military units or similar institutions has been stopped. In such cases, the situation is directly related to the functioning of military units or one industrial enterprise responsible for the formation...

    Full text available to download