Filters
total: 1542
filtered: 1073
-
Catalog
Chosen catalog filters
displaying 1000 best results Help
Search results for: ATTACK SCENARIO
-
Testing Watermark Robustness against Application of Audio Restoration Algorithms
PublicationThe purpose of this study was to test to what extent watermarks embedded in distorted audio signals are immune to audio restoration algorithm performing. Several restoration routines such as noise reduction, spectrum expansion, clipping or clicks reduction were applied in the online website system. The online service was extended with some copyright protection mechanisms proposed by the authors. They contain low-level music features...
-
Green analytical chemistry introduction to chloropropanols determination at no economic and analytical performance costs?
PublicationIn this study we perform ranking of analytical procedures for 3-monochloropopane-1,2-diol determination in soy sauces with PROMETHEE method. Multicriteria decision analysis was performed for three different scenarios – metrological, economic and environmental, by application different weights to decision making criteria. All three scenarios indicate capillary electrophoresis – based procedure as the most preferable. Apart from...
-
Carsharing - Opportunities and Threats for Cities: Proposals of Solutions for Urban Policy
PublicationThe carsharing of a current generation is a short-term car renting service with a capability to find in the nearest surrounding a fleet car parked anywhere in the public space where the previous user left it, as well as to book, open, rent and pay of, with the use of a dedicated mobile application. Nowadays, only a minority of municipalities is considering implementing the carsharing in their policies. The lack of awareness of...
-
Selective jamming of OFDM transmission in NB-IoT radio interface
PublicationThe paper presents the concept of smart jamming, which involves selective interference aimed at critical components of the OFDM signal. Research verifying the feasibility of this type of electronic attack are described. A realized testbed for jamming real NB-IoT signals in a downlink is presented. The test results demonstrate the feasibility of realizing selective jamming and its greater effectiveness compared to barrage interference.
-
Validation of a virtual test environment for C2X communication under radio jamming conditions
PublicationIn this paper, we propose a novel car-2-x communication security testing methodology in the physical layer of wireless systems. The approach is dedicated to automated testing of autonomous vehicles and it is essential for such complex systems operation, especially with regard to safety and security issues. It is based on scenario-driven testing in virtual and real test environments created from collected or simulated data. The...
-
Machine learning-based prediction of preplaced aggregate concrete characteristics
PublicationPreplaced-Aggregate Concrete (PAC) is a type of preplaced concrete where coarse aggregate is placed in the mold and a Portland cement-sand grout with admixtures is injected to fill the voids. Due to the complex nature of PAC, many studies were conducted to determine the effects of admixtures and the compressive and tensile strengths of PAC. Considering that a prediction tool is needed to estimate the compressive and tensile...
-
Driverless Mobility: The Impact on Metropolitan Spatial Structures
PublicationDiffusion of emerging technologies is following the need of solving particular problems. Each innovation produce also some undesirable consequences. Many examples from the past have shown that along with the spread of each technology their side effects are accumulating until the level they need to be solved. One of the examples is automobile, which advantages and disadvantages were already described including its spatial consequences....
-
Long Distance Geographically Distributed InfiniBand Based Computing
PublicationCollaboration between multiple computing centres, referred as federated computing is becom- ing important pillar of High Performance Computing (HPC) and will be one of its key components in the future. To test technical possibilities of future collaboration using 100 Gb optic fiber link (Connection was 900 km in length with 9 ms RTT time) we prepared two scenarios of operation. In the first one, Interdisciplinary Centre for Mathematical...
-
Towards a multi-basin SWAT model for the migration of nutrients and pesticides to Puck Bay (Southern Baltic Sea)
PublicationBackground This paper analyzes the impact of changes in fertilization on crop yields and the runoff of nutrients from a small agricultural catchment (176 km2) to a shallow bay, using the SWAT model. Puck Bay is part of the Gulf of Gdansk and belongs to the Baltic Sea. The whole area of Puck Bay (364 km2) is protected (Natura 2000) yet despite this it suffers from eutrophication problems due to the relatively minimal depth and...
-
Machine learning-based prediction of preplaced aggregate concrete characteristics
PublicationPreplaced-Aggregate Concrete (PAC) is a type of preplaced concrete where coarse aggregate is placed in the mold and a Portland cement-sand grout with admixtures is injected to fill the voids. Due to the complex nature of PAC, many studies were conducted to determine the effects of admixtures and the compressive and tensile strengths of PAC. Considering that a prediction tool is needed to estimate the compressive and tensile strengths...
-
Technical and economic analysis of energy storage in the compressed air technology with low capacity for the production plant
PublicationCompressed air energy storage (CAES) system is a promising technology due to its numerous advantages, including relatively low maintenance cost, a long lifespan and high operational flexibility. This article explores the possibility of designing a CAES power plant as a source of electricity and heat for an existing industrial plant. The study involves the technical analysis of the power plant parameters and the economic analysis...
-
Path dependence, modularity and the offshoring of (some) physician services
PublicationThis paper integrates ideas from modularity and path dependency to explain the potential for and limitations of the offshoring of high value added physician services. While not all medical services are amenable to offshoring, a growing number of physician activities can be viewed as modular components which, at least technically, could be performed remotely. As a result, the presumption that concerns for efficiency dictate how...
-
MAlSim - Mobile Agent Malware Simulator
PublicationOne of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...
-
Narracje o świeżej traumie. Upamiętnianie ataków terrorystycznych w krajobrazie codziennym miast
PublicationRecent trauma Narratives: commemorating terrorist attacks in Everyday cityscape Contemporary city incidentally becomes a non-accidental target of acts violating the primary sense of security and safety. The fundamental assumptions about so- cial and interpersonal interactions that guarantee social life are severely disturbed. These events, primarily the ones related to terrorist attacks, leave in social memo- ry traces associated...
-
Software Agents for Computer Network Security
PublicationThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
Possible uses of crisis situation aiding system in virtual world simulation
PublicationMany of the real world crisis situations like spreading fire, hostile units attack, flood, and etc. are commonly used in computer games where a simulation of extensive virtual world is crucial. This paper presents some ideas for possible uses of existing crisis situation aiding system in such environments. Moreover it shows how this kind of system can be taught during subsequent games with a large number of players.
-
Improvement of Fingerprinting Method based on Hill Cipher by using Frequency Domain
PublicationThe main goal of this paper is to present the advantages of a digital fingerprinting in a frequency domain over a pixel domain, in case of VoD services (Video on Demand). The paper presents basic issues of a multimedia data protection by digital fingerprinting. It also describes threats to embedded fingerprints from both collusion attacks and from a transmission itself. Possible solution was presented on the example of the DCT...
-
MATHEMATICAL MODELING OF FLOOD MANAGEMENT SYSTEM IN THE CITY OF GDAŃSK, ORUŃSKI STREAM CASE STUDY
PublicationAim of the study This study analyses the efficiency of flood protection in a small urban catchment, based on a system of small reservoirs. Material and methods To assess the flood routing and surge reduction, a mathematical model of the river catchment was implemented. This was a lumped hydrological model, based on the SCS-CN method. Channel routing was performed, using kinematic wave equation. The sub-catchments have been determined...
-
Comparative study on total nitrogen prediction in wastewater treatment 1 plant and effect of various feature selection methods on machine learning algorithms performance
PublicationWastewater characteristics prediction in wastewater treatment plants (WWTPs) is valuable and can reduce the number of sampling, energy, and cost. Feature Selection (FS) methods are used in the pre-processing section for enhancing the model performance. This study aims to evaluate the effect of seven different FS methods (filter, wrapper, and embedded methods) on enhancing the prediction accuracy for total nitrogen (TN) in the WWTP...
-
Measurements of High-Speed Data Transmission Radio Link for Special Applications
PublicationIn the article measurements of high-speed data transmission radio link for special applications were presented. Build measurement stand, measurement scenario and obtained results were briefly described. All conducted research work took place in real maritime environment.
-
Taxonomy of Schemes for Resilient Routing
PublicationThis chapter provides a taxonomy of schemes for resilient routing followed by a discussion of their application to contemporary architectures of communication networks. In particular, a general classification of schemes for resilient routing is first presented followed by a description of the reference schemes for IP networks. The chapter in its later part focuses on the representative techniques of resilient routing for a multi-domain...
-
Analysis of impact of lossy audio compression on the robustness of watermark embedded in the DWT domain for non-blind copyright protection
PublicationA methodology of non-blind watermarking of the audio content is proposed. The outline of audio copyright problem and motivation for practical applications are discussed. The algorithmic theory pertaining watermarking techniques is briefly introduced. The system architecture together with employed workflows for embedding and extracting the watermarks are described. The implemented approach is described and obtained results are reported....
-
Ring Opening of Triflates Derived from Benzophospholan-3-one Oxides by Aryl Grignard Reagents as a Route to 2‑Ethynylphenyl(diaryl)phosphine Oxides
PublicationA new simple method for the synthesis of 2-ethynylphenyl(diaryl)phosphine oxides via ring opening of benzophosphol-3-yl triflates has been developed. This process occurs via nucleophilic attack of a Grignard reagent at the phosphorus center, which results in ring opening and cleavage of a leaving group. The reaction proceeds under mild conditions and, within 15−60 min, leads to a library of previously unavailable 2-ethynylphenylphosphine...
-
Detailed investigation of the phase transition inKxP4W8O32and experimental arguments for a charge density wave due to hidden nesting
PublicationDetailed structural and magnetotransport properties of monophosphate tungsten bronze Kx(PO2)4(WO3)8 single crystals are reported. Both galvanomagnetic and thermal properties are shown to be consistent with a charge density wave electronic transition due to hidden nesting of the quasi-1D portion of the Fermi surface. We also observe the enhancement of electronic anisotropy due to reconstruction of the Fermi surface at the Peierls...
-
Collision-free network exploration
PublicationMobile agents start at different nodes of an n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round two agents may occupy the same node. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest time required to reach a configuration in which each agent has visited all nodes and returned to its starting location. In...
-
Flood Classification in a Natural Wetland for Early Spring Conditions Using Various Polarimetric SAR Methods
PublicationAbstract--- One of the major limitations of remote sensing flood detection is the presence of vegetation. Our study focuses on a flood classification using Radarsat-2 Quad-Pol data in a natural floodplain during leafless, dry vegetation (early spring) state. We conducted a supervised classification of a data set composed of nine polarimetric decompositions and Shannon entropy followed by the predictors' importance estimation to...
-
Determination of causes of accelerated local corrosion of austenitic steels in water supply systems
PublicationThis paper concerns an inspection of a water supply system, made of AISI 304 steel, which showed signs of local corrosion at the weld. Such corrosion caused material perforation after very short periods of operation. It was revealed that steel was sensitised during the welding process. It was also proven that chromium micro-segregation occurred in the alloy leading to galvanic cell formation which initialised the process of pitting...
-
Modelowanie systemów energetycznych wytwarzania energii elektrycznej i ciepła do celów planowania rozwoju - wybrane zagadnienia
PublicationSystemy energetyczne wymagają przemian technologicznych w kierunku neutralności klimatycznej. W Polsce, w której systemie elektroenergetycznym i systemach ciepłowniczych dominują przestarzałe elektrownie i ciepłownie węglowe, dążenie do minimalizacji wpływu na środowisko wiąże się z wysokimi kosztami. Dlatego należy szukać optymalnych ścieżek roz-woju energetyki, aby osiągnąć ambitne długoterminowe cele strategiczne, przy minimalizacji...
-
Impact of radio wave polarisation on off-body communications in indoor environments
PublicationThis paper describes the measurements and the analysis of the impact of radio wave polarisation on off-body communications in Body Area Networks in indoor environments. Measurements on polarisation impact are briefly described. Five investigated scenarios with different body postures and different antenna placements are characterised. The difference between the vertical and horizontal components of the received radio signal are...
-
Maritime traffic situation awareness analysis via high-fidelity ship imaging trajectory
PublicationSituation awareness provides crucial yet instant information to maritime traffic participants, and significant attentions are paid to implement traffic situation awareness task via various maritime data source (e.g., automatic identification system, maritime surveillance video, radar, etc.). The study aims to analyze traffic situation with the support of ship imaging trajectory. First, we employ the dark channel prior model to...
-
Possible uses of crisis situation aiding system in virtual world simulation
PublicationMany of the real world crisis situations like spreading fire, hostile units attack, flood, and etc. are commonly used in computer games where a simulation of extensive virtual world is crucial. This paper presents some ideas for possible uses of existing crisis situation aiding system in such environments. Moreover, it shows how this kind of system can be taught during subsequent games with a large number of players. As an example...
-
Mesh dependence study for numerical assessment of hydrodynamic characteristics of windsurfing fin
PublicationThe presented research aims to assess the drag coefficient and lift coefficient versus angle of attack curves for windsurfing fin. Special attention in the research was being paid to the evaluation of the stall angle value. The angle of incidence for which the stall occurs was searched, and the sensitivity of the solution for the mesh resolution was studied. The mesh resolution sensitivity analysis was done by systematically decreasing...
-
Porównanie algorytmów lokalizacji wewnątrzbudynkowej bazujących na radiowych pomiarach odległości
PublicationNiniejszy artykuł ma na celu ocenę wybranych algorytmów estymacji położenia, które mogą być zastosowane w systemach lokalizacji w środowiskach zamkniętych. Przedstawiono pięć algorytmów bazujących na pomiarach odległości. Następnie porównano ich dokładności estymacji w warunkach statycznych oraz dla scenariusza dynamicznego przy ustalonym rozmieszczeniu trzech stacji referencyjnych. Dokonano również porównania czasu estymacji pojedynczej...
-
Fast Fading Influence on the Deep Learning-Based LOS and NLOS Identificationin Wireless Body Area Networks
PublicationIn the article, the fast fading influence on the proposed DL (Deep Learning) approach for LOS (Line-of-Sight) and NLOS (Non-Line-of-Sight) conditions identification in Wireless Body Area Networks is investigated. The research was conducted on the basis of the off-body communication measurements using the developed mobile measurement stand, in an indoor environment for both static and dynamic scenarios. The measurements involved...
-
Biometric identity verification
PublicationThis chapter discusses methods which are capable of protecting automatic speaker verification systems (ASV) from playback attacks. Additionally, it presents a new approach, which uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. We show that in this case training the system with large amounts of spectrogram patches may be difficult, and...
-
The Novel Findings About the Hussite’s Warfares in the Gdansk/Danzig Surrounding in the Late Summer of 1433
PublicationOne of the most spectacular episodes during the Hussite Wars was the Czech raid through the lands of the Teutonic Order up to the Baltic Sea in 1433. Although historians and then-witnesses focused on the sacked Cistercian Abbey in Oliva and soldiers filling the bottles with seawater, the scale of damages in the main harbour of Prussia and its surroundings has not been the subject of research yet. Furthermore, most scholars treatthe...
-
Computational Approach towards Repetitive Design Tasks: The Case Study of Parking Lot Automated Design
PublicationThe study aims to develop and assess an algorithm for efficiently generating parking spot layouts within predefined area outlines. The algorithm is an attempt to streamline the decisionmaking process by producing different design variants and optimizing the utilization of available space. The algorithm’s primary objective is to streamline decision-making by generating diverse design variants while optimizing the use of available...
-
Sewage sludge co-pyrolysis with agricultural/forest residues: A comparative life-cycle assessment
PublicationThis study aims to determine the sustainability and energy efficiency of co-pyrolysis scenarios as treatment processes for municipal sewage sludge through a life cycle assessment (LCA). In addition, sensitivity and energy recovery analyses are conducted to determine the possible methods for optimizing the co-pyrolysis process from a circular bioeconomy perspective. Corncob and wood residue have been selected as potential co-feed...
-
Synergistic effect of TiO2 photocatalytic advanced oxidation processes in the treatment of refinery effluents
PublicationDifferent types of photolytic and photocatalytic advanced oxidation processes (AOPs) were used for treatment of refinery effluents from bitumen production. The treatment efficiency was evaluated by analyzing chemical oxygen demand (COD), biological oxygen demand (BOD5), volatile organic compounds (VOCs) and sulfide ions concentration. The studies revealed a synergistic effect of application of external oxidants (O3, H2O2, O3/H2O2)...
-
CFD modeling of a diesel evaporator used in fuel cell systems
Publication -
CFD analysis of jet flows ejected from different nozzles
Publication -
A novel hybrid adaptive framework for support vector machine-based reliability analysis: A comparative study
PublicationThis study presents an innovative hybrid Adaptive Support Vector Machine - Monte Carlo Simulation (ASVM-MCS) framework for reliability analysis in complex engineering structures. These structures often involve highly nonlinear implicit functions, making traditional gradient-based first or second order reliability algorithms and Monte Carlo Simulation (MCS) time-consuming. The application of surrogate models has proven effective...
-
Pounding between high-rise buildings with different structural arrangements
PublicationEarthquake-induced structural pounding has led to significant damages during previous earthquakes. This paper investigates the effect of pounding on the dynamic response of colliding high-rise buildings with different structural arrangements. Three 3-D buildings are considered in the study, including 5-storey building, 7-storey building and 9-storey building. Three pounding scenarios are also taken into account, i.e. pounding between...
-
Optimised Robust Placement of Hard Quality Sensors for Robust Monitoring of Quality in Drinking Water Distribution Systems
PublicationA problem of optimised robust placement of the hard quality sensors in Drinking Water Distribution Systems under several water demand scenarios for robust quality monitoring is formulated. Numerical algorithms to solve the problem are derived. The optimality is meant as achieving at the same time a desired trade off between the sensor capital and maintenance costs and resulting robust estimation accuracy of the monitoring algorithm...
-
Blackout initial disturbances in electric Power System searching
PublicationThe paper contains short survey of the blackouts that took place in the last few years. The sources and initial disturbances are discussed. The typical scenario of the disturbance, leading to blackout in the electrical power system are presented.Next, models of a power system eligible to considered topic are discussed. Finally the algorithm of the blackout initial disturbances in power system searching is presented.The consideration...
-
Current trends in the field of steganalysis and guidelines for constructions of new steganalysis schemes
PublicationThe paper concerns blind steganalysis techniques in the passive steganalysis scenario designed to detect the steganographic cover modification schemes. The goal is to investigate the state-of-art in the field of steganalysis, and, above all, to recognize current trends existing in this field and determine guidelines for constructions of new steganalysis schemes. The intended effects are to examine the possibilities for the development...
-
Controlling nodal displacement of pantographic structures using matrix condensation and interior-point optimization: A numerical and experimental study
PublicationThis study presents an innovative approach for the precise control of nodal displacements in pantographic structures. The method is founded on the Matrix Condensation of Force Method, seamlessly integrated with an Interior Point Optimization algorithm. This combination offers a unique advantage by allowing users to manipulate displaced nodes within a defined coordination domain. Furthermore, this approach introduces the Interior...
-
Influence of windsurfing fin stiffness distribution on the lift-drag characteristics
PublicationThis article addresses the problem of determining the hydromechanical loads generated by flexible hydrofoils. The research was done on the example of the composite windsurfing fin for the RS:X monotype class. Despite the assumption of fins identity, everyday practice showed that variations of mechanical properties occur and strongly affect their performance. Therefore, we decided to study the differences between the windsurfing...
-
Simulating Malware with MAlSim
PublicationThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating malware with MAlSim
PublicationThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...