Filters
total: 1680
filtered: 1237
-
Catalog
- Publications 1237 available results
- Journals 131 available results
- Conferences 82 available results
- Publishing Houses 1 available results
- People 43 available results
- Projects 9 available results
- e-Learning Courses 16 available results
- Events 3 available results
- Open Research Data 158 available results
Chosen catalog filters
displaying 1000 best results Help
Search results for: bathing security
-
Rating Prediction with Contextual Conditional Preferences
PublicationExploiting contextual information is considered a good solution to improve the quality of recommendations, aiming at suggesting more relevant items for a specific context. On the other hand, recommender systems research still strive for solving the cold-start problem, namely where not enough information about users and their ratings is available. In this paper we propose a new rating prediction algorithm to face the cold-start...
-
Current challenges and methodological issues of functional safety and security management in hazardous technical systems
PublicationCelem artykułu jest zidentyfikowanie problemów oceny ryzyka w kontekście stosowania systemów elektrycznych / elektronicznych / programowalnych elektronicznych (E/E/PE) z uwzględnieniem aspektów bezpieczeństwa funkcjonalnego i zabezpieczeń (ochrony). Zadaniem rozwiązań bezpieczeństwa funkcjonalnego jest efektywne redukowanie ryzyka wychodząc z poziomu nieakceptowanego. Ryzyko jest definiowane jako kombinacja prawdopodobieństwa wystąpienia...
-
Performance and Security Testing of Distributed Applications Working in Public/Private IPSec and HTTPS Environments
PublicationW pracy przedstawiono zagadnienie testowania wydajności (ang. Performance) i bezpieczeństwa (ang. Security) aplikacji rozproszonych działających w sieciach publiczno-prywatnych stworzonych przy wykorzystaniu technologii IPSec i HTTPS. Dwa podejścia do architektury oprogramowania tych aplikacji zostały omówione: Request/Response oraz Publish/Subscribe. Analiza zawiera przedstawienie wpływu technologii IPSec i HTTPS na całkowitą...
-
Machine Learning for Control Systems Security of Industrial Robots: a Post-covid-19 Overview
Publication -
A rough cut cybersecurity investment using portfolio of security controls with maximum cybersecurity value
Publication -
Determining and verifying the safety integrity level of the safety instrumented systems with the uncertainty and security aspects
PublicationSafety and security aspects consist of two different group of functional requirements for the control and protection systems. In the paper it is proposed that the security analysis results can be used as a factor increasing or decreasing the risk level. It concerns a process of determining required safety integrity level of given safety functions. The authors propose a new approach for functional safety risk analysis. In this case...
-
Benchmarking Scalability and Security Configuration Impact for A Distributed Sensors-Server IOT Use Case
PublicationInternet of Things has been getting more and more attention and found numerous practical applications. Especially important in this context are performance, security and ability to cope with failures. Especially crucial is to find good trade-off between these. In this article we present results of practical tests with multiple clients representing sensors sending notifications to an IoT middleware – DeviceHive. We investigate performance...
-
Multimedia Communications, Services and Security MCSS. 10th International Conference, MCSS 2020, Preface
PublicationMultimedia surrounds us everywhere. It is estimated that only a part of the recorded resources are processed and analyzed. These resources offer enormous opportunities to improve the quality of life of citizens. As a result, of the introduction of a new type of algorithms to improve security by maintaining a high level of privacy protection. Among the many articles, there are examples of solutions for improving the operation of...
-
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
PublicationBiometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...
-
Pattern matching localization in ZigBee wireless sensor networks.
PublicationLokalizacja typu Pattern matching w sieciach sensorów bezprzewodowych ZigBee.Prezentacja metod implementacji algorytmów lokalizacji. Praktyczne zastosowanie i testowanie lokalizacji sieci ZigBee.
-
Matching Split Distance for Unrooted Binary Phylogenetic Trees
Publication -
Impedance matching in dual-frequency induction heating systems
Publication -
Selection of cutting and washing fluids as a method of waste minimization
PublicationW artykule przedstawiono wyniki testów korozyjności dla cieczy obróbkowych wykorzystywanych do produkcji przekładni skrzyni biegów. Testy prowadzono zgodnie z normami: DIN 51360-2 (Ford-test) oraz PN-92/M-55789. Badaniom poddano trzy ciecze obróbkowe oraz trzy ciecze chłodzące. Wraz ze spadkiem stężenia użytej cieczy, obserwowano większe ogniska korozji.
-
Improving web user experience with caching user interface
PublicationOften, Web technologies are used to operate or to configure network-enabled equipment, to configure and administer modular applications, or as teaching environments. The comfort of human work requires a similar response time in these applications as in the Internet. To improve response time, various forms of caching at different levels are employed. To improve the user experience in regard to response time when performing specific...
-
Improving web user experience with caching user interface
PublicationIn human-computer interaction, response time is assumed generally not to exceed significantly 1-2 seconds. While the natural competition in the Internet public Web serving ensures adhering widely to such limits, some Web environments are less competitive and offer much worse user experience in terms of response time. This paper describes a solution to significantly improve user experience in terms of response time with only modification...
-
Impulse and high frequency methods of lighting earthing testes.
PublicationUziemienia projektowane dla prądów zwarciowych nie zawsze są właściwe do odprowadzania prądów piorunowych, gdzie należy brać pod uwagę impedancję uziemień. W pracy porównano metody: udarową oraz wysokiej częstotliwości zastosowane do oceny przydatności uziemień odgromowych.
-
Dynamic Compatibility Matching of Services for Distributed Workflow Execution
PublicationThe paper presents a concept and an implementation of dynamic learn-ing of compatibilities of services used in a workflow application. While services may have the same functionality, they may accept input and produce output in different formats. The proposed solution learns matching of outputs and inputs at runtime and uses this knowledge in subsequent runs of workflow applications. The presented solution was implemented in an...
-
Matching Split Distance for Unrooted Binary Phylogenetic Trees
PublicationRekonstrukcja drzew ewolucji jest jednym z głównych celów w bioinformatyce. Drzewa filogenetyczne reprezentuje historię ewolucji i związki pokrewieństwa między różnymi gatunkami. W pracy proponujemy nową ogólną metodę określania odległości między nieukorzenionymi drzewami filogenetycznymi, szczególnie użyteczną dla dużych zbiorów gatunków. Następnie podajemy szczegółowe własności jednej metryki określonej przy użyciu tej metody...
-
FFT spectrum based matching algorithm for activedynamic thermography
PublicationIn Active Dynamic thermography (ADT) sequences of consecutive temperature distributions are analyzed. In biomedical applications of ADT, the problems of a patient's movements in front of a thermal camera should be eliminated before data analysis. Complete mechanical stabilization of the patients is impossible due to natural voluntary and involuntary moves caused by pulse breathing, etc. This paper presents a simple and efficient...
-
THE ASSESSMENT OF THE SITUATION IN BANKING SECTORS IN SELECTED EUROPEAN COUNTRIES
PublicationThe economic significance of the banking sector is well recognized in the theory and practice. In the literature there are discussed various topics concerning banking: banking sectors stability and its determinants, as well as influence of the banking sector on other sectors of the economy. Moreover the situation in the banking sector has been studied from different perspectives: its stability, profitability, efficiency, competition,...
-
Optimal backbone coloring of split graphs with matching backbones
PublicationFor a graph G with a given subgraph H, the backbone coloring is defined as the mapping c: V(G) -> N+ such that |c(u)-c(v)| >= 2 for each edge uv \in E(H) and |c(u)-c(v)| >= 1 for each edge uv \in E(G). The backbone chromatic number BBC(G;H) is the smallest integer k such that there exists a backbone coloring with max c(V(G)) = k. In this paper, we present the algorithm for the backbone coloring of split graphs with matching backbone.
-
Matching trajectory of a person to a map in inertial navigation system
PublicationPaper describes the method of matching, to a map, trajectories of a person walking indoors, obtained from inertial navigation module. General principle of matching algorithm based on particle filtering is presented. Method of detecting particle collisions is described as well. The last chapter provides test results of map matching related to a true trajectory.
-
Low Frequency Electromagnetic Interferences Impact on Transport Security Systems Used in Wide Transport Areas
Publication -
Assessment of Financial Security of SMEs Operating in the Renewable Energy Industry during COVID-19 Pandemic
Publication -
Bound entanglement maximally violating Bell inequalities: quantum entanglement is not fully equivalent to cryptographic security
PublicationW pracy pokazano, że czterokubitowy stan o splątaniu związanym może maksymalnie łamać prostą nierówność Bella podobną do standardowej nierówności CHSH. Prostota rozważanego układu oraz odporność splątania sprawiają, że łamanie to jest obiecujące dla współczesnej technologii eksperymentalnej. Z drugiej strony, splątanie tego stanu nie pozwala na destylację bezpiecznego klucza kryptograficznego, zatem ani splątanie, ani maksymalne...
-
Performance and Security Testing for Improving Quality of Distributed Applications Working in Public/Private Network Environments
PublicationThe goal of this dissertation is to create an integrated testing approach to distributed applications, combining both security and performance testing methodologies, allowing computer scientist to achieve appropriate balance between security and performance charakterstics from application requirements point of view. The constructed method: Multidimensional Approach to Quality Analysis (MA2QA) allows researcher to represent software...
-
Knowledge-based functional safety and security management in hazardous industrial plants with emphasis on human factors
PublicationExisting and emerging new hazards have significant potential to impact destructively operation of technical systems, hazardous plants, and systems / networks of critical infrastructure. The programmable control and protection systems play nowadays an important role in reducing and controlling risk in the process of hazardous plant operation. It is outlined how to deal with security related hazards concerning such systems to be...
-
Onychophagia: A Synopsis of Nail Biting and Its Management
Publication -
Onychophagia: A synopsis of nail biting and its management
Publication -
Further developments of parameterization methods of audio stream analysis for secuirty purposes
PublicationThe paper presents an automatic sound recognition algorithm intended for application in an audiovisual security monitoring system. A distributed character of security systems does not allow for simultaneous observation of multiple multimedia streams, thus an automatic recognition algorithm must be introduced. In the paper, a module for the parameterization and automatic detection of audio events is described. The spectral analyses...
-
Improvement of Imperfect String Matching Based on Asymetric n-Grams
PublicationTypical approaches to string comparing treats them as either different or identical without taking into account the possibility of misspelling of the word. In this article we present an approach we used for improvement of imperfect string matching that allows one to reconstruct potential string distortions. The proposed method increases the quality of imperfect string matching, allowing the lookup of misspelled words without significant...
-
Elastic Fender-Dolphin Interaction for Economic Design of Berthing Dolphins
PublicationThe study addresses the question of the possible design benefits when considering the interaction between a modern marine modular rubber fender and a steel tubular pile substructure of a berthing dolphin. Absorption of the berthing kinetic energy of the vessel by a dualelasticity pile-fender berthing system is described in detail using the interactive treatment method (ITM). Application of the ITM is illustrated by a calculative...
-
Variable length sliding models for banking clients face biometry
PublicationAn experiment was organized in 100 bank branches to acquire biometric samples from nearly 5000 clients including face images. A procedure for creating face verification models based on continuously expanding database of biometric samples is proposed, implemented, and tested. The presented model applies to circumstances where it is possible to collect and to take into account new biometric samples after each positive verification...
-
Size reduction of ultra-wideband antennas with efficiency and matching constraints
PublicationAntenna design is a multifaceted task that involves handling of various performance figures concerning both electrical performance of the structure as well as its geometry. Simultaneous control of several objectives through rigorous optimization is very challenging and virtually impossible through conventional approaches such as parameter sweeping. In this work, we investigate size reduction of ultra‐wideband antenna structures...
-
Matching Exception Class Hierarchies between .NET, Java Environments
PublicationThe paper presents a methodology of exception classification and matching exception messages between .NET andJava environments. The methodology operates on existing exception class hierarchies and proposes two complementingapproaches: automated and manual matching. The automated matching uses the similarity measure to find associationsbetween exception messages from the two sets of classes for the considered programming languages....
-
Development of banking sectors in Kosovo and Montenegro in the years 2000-2010
Publication -
Autonomous Energy Matching Control in an LLC Induction Heating Generator
Publication -
Dual-Frequency Induction Heating Generator With Adjustable Impedance Matching
Publication -
Comparing phylogenetic trees using a minimum weight perfect matching
PublicationA phylogenetic tree represents historical evolutionary relationshipbetween different species or organisms. There are various methods for reconstructing phylogenetic trees.Applying those techniques usually results in different treesfor the same input data. An important problem is to determinehow distant two trees reconstructed in such a wayare from each other. Comparing phylogenetic trees is alsouseful in mining phylogenetic information...
-
Tighter bounds on the size of a maximum P3-matching in a cubic graph
PublicationW pracy pokazano, że największe P3-skojarzenie dla dowolnego grafu o n>16 wierzchołkach składa się z przynajmniej 117n/152 wierzchołków.
-
Band misplacement: a rare complication of laparoscopic adjustable gastric banding
Publication -
The First Report on Hybrid NOTES Adjustable Gastric Banding in Human
Publication -
Real-Time Aerial Mapping by Image Features Extraction and Matching
Publication -
Hydroacoustic ships berthing aid systems in Gdańsk north harbour
PublicationManewry dobijania statków do nabrzeży portowych są trudnymi operacjami, przy których należy uwzględniać m. in. na pływy, wiatry, widzialność, prędkość, masę statku, odległość od pirsu. Ewentualna kolizja z pirsem niesie poważne konsekwencje, szczególnie groźne dla wielkich statków a zwłaszcza tankowców. Referat prezentuje hydroakustyczne systemy kontroli manewrów statków wykonane przez zespół pracowników Katedry Systemów Elektroniki...
-
Maturity Mismatch in the Polish Banking System and its Impact on the Economy
PublicationIn the article maturity mismatch in the Polish banking system is estimated based on the publicly available data. Then the impact on the economy is discussed. Based on Polish central bank’s data it may be estimated that between 1996 and 2012 the maturity gap increased significantly – average residual maturity of assets exceeds 6 years in 2012 (less than 2 years in 1996), while that of liabilities remains below 1 year. The gap...
-
Multi-objective antenna design by means of sequential domain patching
PublicationA simple yet robust methodology for rapid multiobjective design optimization of antenna structures has been presented. The key component of our approach is sequential domain patching of the design space which is a stencil-based search that aims at creating a path that connects the extreme Pareto-optimal designs, obtained by means of single-objective optimization runs. The patching process yields the initial approximation of the...
-
On the low-cost design of abbreviated multisection planar matching transformer
PublicationA numerically demanding wideband matching transformer composed of three nonuniform transmission lines (NUTLs) has been designed and optimized at a low computational cost. The computational feasibility of the design has been acquired through the exploitation of low-fidelity NUTL models in most steps of the design procedure and an implicit space mapping optimization engine, providing high accuracy results with only a handful of EM...
-
Localization of impulsive disturbances in audio signals using template matching
PublicationIn this paper, a new solution to the problem of elimination of impulsive disturbances from audio signals, based on the matched filtering technique, is proposed. The new approach stems from the observation that a large proportion of noise pulses corrupting audio recordings have highly repetitive shapes that match several typical “patterns”. In many cases a representative set of exemplary pulse waveforms can be extracted from the...
-
Development of banking sectors in Kosovo and Montenegro in the years 2000 - 2010
PublicationThe article presents main aspects of development of banking markets in two Balkan countries - Kosovo and Montenegro. Both of them are charaterised by similar recent history, both in political and economical fields. Their financial sectors have had to be built almost from scretch. The author describes stages of development of competition in the banking sectors, using the following ratios: performace, structure, liquidity. The data...
-
Evaluation of Decision Fusion Methods for Multimodal Biometrics in the Banking Application
PublicationAn evaluation of decision fusion methods based on Dempster-Shafer Theory (DST) and its modifications is presented in the article, studied over real biometric data from the engineered multimodal banking client verification system. First, the approaches for multimodal biometric data fusion for verification are explained. Then the proposed implementation of comparison scores fusion is presented, including details on the application...