Filters
total: 1747
filtered: 828
-
Catalog
- Publications 828 available results
- Journals 112 available results
- Conferences 80 available results
- Publishing Houses 1 available results
- People 47 available results
- Projects 8 available results
- Laboratories 1 available results
- Research Teams 1 available results
- e-Learning Courses 12 available results
- Events 1 available results
- Open Research Data 656 available results
Chosen catalog filters
Search results for: Gwardia Security
-
VISUALIZATION OF SCANTER AND ARPA RADAR DATA IN THE DISTRIBUTED TELEINFORMATION SYSTEM FOR THE BORDER GUARD
PublicationMonitoring of country maritime border is an important task of the Border Guard. This activity can be enhanced with the use of the technology enabling gathering information from distributed sources, processing of that information and its visualization. The paper presents the next stage of development of the STRADAR project (Streaming of real-time data transmission in distributed dispatching and teleinformation systems of the Border...
-
Symulacja metody korekty składowej stałej w sygnale przetwarzanym przez przetwornik "napięcie-częstotliwość"
Publication -
Rejestrator zmiennej częstotliwości sygnału
Publication -
Implementation of an Adaptive Method for Changing the Frequency Division of the Counter Clock Signal in a Frequency-to-Code Converter
PublicationProcessing physical quantities into an indirect signal is a standard method of transferring information about the measured quantity to the master system, which analyzes the data obtained from the acquisition system. The intermediate signal is very often the voltage, but another transmission medium can be the frequency of the output signal of the “physical quantity-to-frequency” converter. The article presents the implementation...
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublicationDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
Wpływ barier ochronnych na poziom bezpieczeństwa ruchu drogowego
PublicationWypadki drogowe wciąż stanowią znaczną przyczynę zgonów, dlatego bardzo ważnym jest odpowiednie kształtowanie otoczenia drogi – by mogło ono uzyskać miano „wybaczającego”. Artykuł stanowi wprowadzenie do tematyki drogowych barier ochronnych, i jest częścią pracy dyplomowej realizowanej na Politechnice Gdańskiej, w ramach której autorzy analizują zależności pomiędzy wypadkami a omawianymi urządzeniami BRD. W artykule przedstawiono...
-
A framework for automatic detection of abandoned luggage in airport terminal
PublicationA framework for automatic detection of events in a video stream transmitted from a monitoring system is presented. The framework is based on the widely used background subtraction and object tracking algorithms. The authors elaborated an algorithm for detection of left and removed objects based on mor-phological processing and edge detection. The event detection algorithm collects and analyzes data of all the moving objects in...
-
Expert assessment of arguments: a method and its experimental evaluation
PublicationArgument structures are commonly used to develop and present cases for safety, security and other properties. Such argument structures tend to grow excessively. To deal with this problem, appropriate methods of their assessment are required. Two objectives are of particular interest: (1) systematic and explicit assessment of the compelling power of an argument, and (2) communication of the result of such an assessment to relevant...
-
Eye-Gaze Tracking-Based Telepresence System for Videoconferencing
PublicationAn approach to the teleimmersive videoconferencing system enhanced by the pan-tilt-zoom (PTZ) camera, controlled by the eye-gaze tracking system, is presented in this paper. An overview of the existing telepresence systems, especially dedicated to videoconferencing is included. The presented approach is based on the CyberEye eye-gaze tracking system engineered at the Multimedia Systems Department (MSD) of Gdańsk University of Technology...
-
Nuclear power plant as a source of electrical energy and heat
PublicationIn this paper certain issues concerning usage of nuclear power plants as sources of not only electric power but also thermal energy will be discussed. For such a solution appeals most of all the need to limit harmful emissions of gases (including CO2) and ashes, which come from the process of burning fossil fuels, as well as the raising demand for network heat and chill. Additionally combined heat and power production brings measurable...
-
Supporting Cybersecurity Compliance Assessment of Industrial Automation and Control System Components
PublicationThe chapter presents a case study demonstrating how security requirements of an Industrial Automation and Control System (IACS) component can be represented in a form of Protection Profile that is based on IEC 62443 standards and how compliance assessment of such component can be supported by explicitly representing a conformity argument in a form based on the OMG SACM meta-model. It is also demonstrated how an advanced argument...
-
In Situ Verification of Numerical Model of Water Hammer in Slurries
PublicationThis paper presents a numerical model of transient flow in a pressure slurry pipeline network with verification based on in situ measurements. The model, primarily verified in laboratory conditions, has been extended and applied to the case of a large and complex slurry pipeline network in Poland. In the model, the equivalent density concept was applied. In situ experiments were performed for various unsteady flow episodes, caused by...
-
Bezpieczeństwo w IP Multimedia Subsystem
PublicationAbstrakt Artykuł jest trzecim w cyklu prac poświęconych IP Multimedia Subsystem (IMS) - po przedstawieniu architektury i usług IMS, odpowiednio w zeszytach 12/2009 oraz 2-3/2011 Przeglądu Telekomunikacyjnego i Wiadomości Telekomunikacyjnych. W obecnym artykule przedstawiono sposoby zapewnienia bezpieczeństwa przy realizacji tych usług.Artykuł został podzielony został na trzy części w których omówiono ogólne wyzwania bezpieczeństwa...
-
Political Parties in the Digital World
PublicationThe aim of this report is to outline how digital technologies and digital media are redefining the way political parties fulfill their role as collective platforms for political participation of citizens, e.g. in relation to the parties’ decision-making processes, communication strategies, funding mechanisms, membership, information sharing, etc. and to highlight the existing international standards and good practices in this area....
-
Stadion Śląski. Analiza wytrzymałościowa nowego łącznika lin radialnych i obwodowych w konstrukcji zadaszenia i innych kluczowych detali konstrukcyjnych
PublicationPrzyczyną niepowodzeń w montażu zadaszenia Stadionu Śląskiego była awaria (zerwanie) staliwnego łącznika („krokodyla”) pomiędzy linami radialnymi i obwodowymi. W ramach audytu konstrukcji zadaszenia autorzy stworzyli wytyczne dla nowego łącznika i w konsekwencji dokonali analiz nośności zaprojektowanej ponownie konstrukcji. W referacie przedstawiono ponadto analizy wytężenia połączeń sworzniowych lin do konstrukcji stalowej i szczegółowe...
-
KONCEPCJA WSPÓŁPRACY SYSTEMU STRUMIENIOWEJ TRANSMISJI DANYCH CZASU RZECZYWISTEGO STRADAR Z EUROPEJSKIM SYSTEMEM EUROSUR
PublicationPrzedstawiono koncepcję współpracy systemów STRADAR i EUROSUR, w celu wymiany informacji związanych z ochroną granic UE. Opisano cechy zrealizowanego demonstratora STRADAR i zasady komunikacji oraz bezpieczeństwa wymiany informacji w systemie EUROSUR. Opisano warianty wymiany infor-macji pomiędzy systemami STRADAR i EUROSUR, od najprostszych, możliwych do zastosowania w obecnej wersji STRADAR, do zautomatyzowanych, wymagających...
-
Low-dimensional bound entanglement with one-way distillable cryptographic key
PublicationIn this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...
-
Using EO satellite data in Safe City and Coastal Zone web-GIS
PublicationThe paper presents a novel design of a web-based Safe City & Coastal Zone GIS (SCCZ-GIS) which integrates data acquired from different remote sensing and geospatial data sources for monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilizes several innovative technologies and directly co-operates with different remote sensing data sources and services, like a satellite ground station...
-
Support for argument structures review and assessment
PublicationArgument structures are commonly used to develop and present cases for safety, security and for other properties of systems. Such structures tend to grow excessively, which causes problems with their review and assessment. Two issues are of particular interest: (1) systematic and explicit assessment of the compelling power of an argument, and (2) communication of the result of such an assessment to relevant recipients. The paper...
-
Hedging Strategies of Derivatives Instruments for Commodity Trading Entities
PublicationHedging as an outcome of risk management arises to account several questions. Mentioned aspect of size of the hedging is one of them. Latter questioning refers to whether producer of manufacturer are willing to secure entire exposure, when the hedging should start, now or later in the future, what is the vision on market like direction of market, time of interest, magnitude of exposure, what would be the preferred instruments of...
-
A survey of neural networks usage for intrusion detection systems
PublicationIn recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...
-
E-Voting System Evaluation Based on the Council of Europe Recommendations: nVotes
PublicationE-voting implantation has been facing important challenges in recent years. Several incidents, together with a lack of evaluation methodologies social and cultural customs hinder a broader application. In this work, the authors aim to contribute to a safer introduction of e-voting tools by applying a practical evaluation framework strongly based on the security requirements issued by the Council of Europe (CoE) in 2017 to nvotes,...
-
Current air quality analytics and monitoring: A review
PublicationThis review summarizes the different tools and concepts that are commonly applied in air quality monitoring. The monitoring of atmosphere is extremely important as the air quality is an important problem for large communities. Main requirements for analytical devices used for monitoring include a long period of autonomic operation and portability. These instruments, however, are often characterized by poor analytical performance....
-
Magnetic deep eutectic solvents – Fundamentals and applications
PublicationMagnetic deep eutectic solvents (MDES), a relatively new subclass of conventional deep eutectic solvents (DES) containing additional paramagnetic components in their structure. MDES exhibit a strong response toward external magnetic fields, thus they can improve many industrial and analytical applications. In addition, this new group of solvents present unique physicochemical properties that can be easily tuned by selecting the...
-
Algorytmy planowania i sterowania realizacją zadań produkcyjnych z wykorzystaniem teorii ograniczeń
PublicationNiniejszy rozdział dotyczy tematyki planowania i sterowania produkcją zgodniiie z Teorią Ograniczeń (TOC). Przedstawiono w nim założenia i etapy zarzadzania produkcją zdefiniowane prze TOC. Zaprezentowano etapy planowania i sterowania produkcją zgodnie z metodą Werbel-Bufor-Lina. Przedstawiono również,oparty na metodzie analitycznej, szczegółowy algorytm harmonogramowania zadań, wraz z przykładem jego realizacji. Algorytm ten pozwala...
-
Wpływ przesuwników fazowych na stabilność systemu elektroenergetycznego
PublicationW referacie przedstawiono wpływ przesuwników fazowych typu FACTS na możliwość poprawy stabilności kątowej. Prezentowane wyniki otrzymano w wyniku symulacji dynamicznej wykonanej na modelu matematycznym układu trójmaszynowego współpracującego z siecią 400 kV. W modelach zespołów wytwórczych uwzględniono modele turbin z ich regulatorami oraz modele generatorów synchronicznych z ich układami wzbudzenia i regulacji napięcia. Przesuwnik...
-
Wpływ pomiaru dokładności napięć na wyznaczenie impedancji pętli zwarciowej metodą z przesunięciem y
PublicationMetoda z przesunięciem y to jedna z metod pomiaru impedancji pętli oparta na pomiarze składowych ortogonalnych napięcia umożliwiająca wyznaczenie wartości impedancji pętli znaczenie dokładniej niż metody klasyczne. Metoda ma posiada szereg zalet. Z racji tego poddawana jest ona ciągłym analizom metrologicznym pozwalającym na realizację modelu fizycznego miernika działającego w oparciu o tę metodę i odznaczającego się jeszcze lepszymi...
-
Application of residual current devices in electrical installations with frequency converters
PublicationW instalacjach elektrycznych, w których znajdują się przemienniki częstotliwości mogą pojawić się prądy zwarcia doziemnego o różnej częstotliwości lub stałe. Większość wyłączników różnicowoprądowych nie reaguje na tego typu prądy, co powoduje, że ochrona przeciwporażeniowa jest nieskuteczna. W obwodach z przemiennikami częstotliwości mogą pojawiać się przejściowe i ustalone prądy upływowe o znacznych wartościach. Prądy te znacząco...
-
Enhancing Facial Palsy Treatment through Artificial Intelligence: From Diagnosis to Recovery Monitoring
PublicationThe objective of this study is to develop and assess a mobile application that leverages artificial intelligence (AI) to support the rehabilitation of individuals with facial nerve paralysis. The application features two primary functionalities: assessing the paralysis severity and facilitating the monitoring of rehabilitation exercises. The AI algorithm employed for this purpose was Google's ML Kit “face-detection”. The classification...
-
Health monitoring services based on off-the-shelf mobile devices
PublicationDevelopment of health monitoring systems usually involves usage of dedicated devices with provided guarantees in terms of their reliability. Those devices raise the cost of the whole system, because of which such platforms are limited only to specific areas and constrained number of users. Usage of off-the- shelf devices could lower the cost and bring those systems to the masses. The paper covers possible uses of common off-the-shelf...
-
A model-based approach to analysis of authentication protocols.
PublicationW referacie przedstawiono zintegrowane podejście do analizy protokołów uwierzytelniania o nazwie Object-oriented Formal Authentication Protocol Security Analysis Framework (OF-APSAF). Podejście to jest zaprojektowane na bazie sprawdzonej metody formalnej CSP wraz z narzędziami ją wspierającymi: Casper oraz FDR. Jego integralną częścią jest półformalna zorientowana obiektowo technika modelowania protokołów, ich kontekstu oraz wymagań...
-
Reconfigurable Antennas for Trustable Things
PublicationIn modern applications, the Internet of Things plays a significant role in increasing the productivity, effectiveness or safety and security of people and assets. Additionally, the reliability of Internet of Things components is crucial from the application point of view, where a resilient and low-latency network is needed. This can be achieved by utilizing reconfigurable antennas to enhance the capabilities of the wireless sensor...
-
The Impact of Ergonomic Guiding Principles on the Formation of Modern Monumental Art
PublicationCommemoration of historic events is now a commonplace phenomenon both in culture and in academic research. The phenomenon is linked to an increase in the representation of the visualisation of the past in public sphere, which in turn leads to reformulation of monumental art. Modern monuments are often spatial forms consisting both of sculpture installation and bigger constructions. In case of these realisations, the designers,...
-
Functional safety with cybersecurity for the control and protection systems on example of the oil port infrastructure
PublicationSafety and cybersecurity aspects consist of two different group of functional requirements for the industrial control and protection systems in the oil port installation. It is the main reason why the analyses of safety and cybersecurity shouldn’t be integrated directly. These article presented some important issues of the functional safety analysis with regard to cybersecurity aspects in the oil seaport infrastructure. The proposed...
-
Methodological issues of functional safety and reliability assessment of critical systems in industrial hazardous plants
PublicationThe aim of this article is to identify and discuss some methodological issues that are of interest among functional safety specialists and experts after publication of the second edition of international standards IEC 61508 and IEC 61511, including the design and implementing the safety-related functions of higher safety integrity levels and protection layers. The basic role of safety-related systems is to reduce effectively and...
-
Coastal zone monitoring using Sentinel-1 SAR polarymetry data
PublicationIn recent years the role of the surveillance and security of Polish boundaries has significantly increased. Polish coastal zone monitoring requires various approaches using various technological means in order to ensure the protection of Polish boundaries. In this paper, the authors discuss and present alternatives to underwater surveillance methods of coastal area analysis and monitoring using data retrieved from the newly developed...
-
ADAPTIVE PREDICTIONS OF THE EURO/ZŁOTY CURRENCY EXCHANGE RATE USING STATE SPACE WAVELET NETWORKS AND FORECAST COMBINATIONS
PublicationThe paper considers the forecasting of the euro/Polish złoty (EUR/PLN) spot exchange rate by applying state space wavelet network and econometric forecast combination models. Both prediction methods are applied to produce one-trading-day- ahead forecasts of the EUR/PLN exchange rate. The paper presents the general state space wavelet network and forecast combination models as well as their underlying principles. The state space...
-
A fair distribution scheme for joint fingerprinting and decryption methods= Sprawiedliwy schemat dystrybucji dla metod łącznego osadzania odcisku palca oraz deszyfracji
PublicationThe paper addresses the fairness of the security provided by digital fingerprinting methods. It was noted that the digital fingerprinting techniques are designed primarily to protect service providers against the actions of malicious users, while honest users remain vulnerable to acts of malicious providers. The paper describes the customer's rights problem and the unbinding problem, which also apply to joint fingerprinting and...
-
Electricity demand prediction by multi-agent system with history-based weighting
PublicationEnergy and load demand forecasting in short-horizons, over an interval ranging from one hour to one week, is crucial for on-line scheduling and security functions of power system. Many load forecasting methods have been developed in recent years which are usually complex solutions with many adjustable parameters. Best-matching models and their relevant parameters have to be determined in a search procedure. We propose a hybrid...
-
Stradar - Multimedia Dispatcher and Teleinformation System for the Border Guard
PublicationSecurity of national borders requires utilization of multimedia surveillance systems automatically gathering, processing and sharing various data. The paper presents such a system developed for the Maritime Division of the Polish Border Guard within the STRADAR project. The system, apart from providing communication means, gathers data, such as map data from AIS, GPS and radar receivers, videos and photos from camera or audio from...
-
Deep Learning: A Case Study for Image Recognition Using Transfer Learning
PublicationDeep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...
-
Deep Learning
PublicationDeep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...
-
I, Robot: between angel and evil
PublicationThe boosting of most digital innovations within recent technology progress by artificial intelligence (AI) constitutes a growing topic of interest. Besides its technical aspects, increasing research activity may be observed in the domain of security challenges, and therefore of responsibility related to the controlled or hypothetically uncontrolled or autonomous emergence of AI solutions. Consequently, responsibility and ethics...
-
Integration and Visualization of the Results of Hydrodynamic Models in the Maritime Network-Centric GIS of Gulf of Gdansk
PublicationEnsuring of security in the coastal area makes on a seaside countries research in the field of infrastructure spatial information of environmental data. The paper presents the results of work on the construction of this infrastructure by integrating electronic navigational chart with ortophotomaps of coastal areas as well as numerical data from weather and hydrodynamic models. Paper focuses on a problems associated with creating...
-
Techniczne aspekty implementacji nowoczesnej platformy e-learningowej
PublicationZaprezentowano aspekty techniczne implementacji nowoczesnej platformy nauczania zdalnego. Omówiono obszary funkcjonalne takie jak: system zarządzania nauczaniem, serwis informacyjny, dodatkowe oprogramowanie dydaktyczne oraz kolekcja zasobów multimedialnych. Przybliżono zagadnienia związane z bezpieczeństwem takiej platformy. Na końcu przedstawiono parametry techniczne wdrożonej na Politechnice Gdańskiej platformy eNauczanie.
-
Neural networks and deep learning
PublicationIn this chapter we will provide the general and fundamental background related to Neural Networks and Deep Learning techniques. Specifically, we divide the fundamentals of deep learning in three parts, the first one introduces Deep Feed Forward Networks and the main training algorithms in the context of optimization. The second part covers Convolutional Neural Networks (CNN) and discusses their main advantages and shortcomings...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublicationThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
A strong preference for the TA/TA dinucleotide step discovered for an acridine-based, potent antitumor dsDNA intercalator, C-1305: NMR-driven structural and sequence-specificity studies
PublicationTriazoloacridinone C-1305, a potent antitumor agent recommended for Phase I clinical trials, exhibits high activity towards a wide range of experimental colon carcinomas, in many cases associated with complete tumor regression. C-1305 is a well-established dsDNA intercalator, yet no information on its mode of binding into DNA is available to date. Herein, we present the NMR-driven and MD-refined reconstruction of the 3D structures...
-
Selected aspects of traction transformer diagnosis based on analysis of power looses in windings and the iron core
PublicationW rozdziale przedstawiono metodę diagnostyki detekcji uszkodzeń wewnętrznych uzwojeń transformatora trakcyjnego oparta na analizie strat mocy rozpraszanej wewnątrz transformatora. Straty mocy są powiekszane o szereg czynników świadczacych o uszkodzeniu transformatora takich jak: zwarcia zwojowe, asymetria uzwojeń, relaksacja naprężeń na stykach połaczeń, uszkodzenie izolacji pomiedzy blachami rdzenia itp. Proponowana metoda dokonuje...
-
Application of non-metal doped titania for inverted polymer solar cells
PublicationDomieszkowany jodem oraz domieszkowany jodem ditlenek tytanu uzyto jako warstwę buforową w ogniwie ITO/X-TiO2?P3HT-PCMB /MnO2/ Ag.Warswty X-TiO2 nalożono metodą spin-coatingu z zawiesiny nanocząstek w DMSO. Jednorodne struktury scharakteryzowane pod względem morfologii mikroskopowo metodą AFM. Charakterystyka prądowo-napięciowa urzdzeń wskazuje iż domieszkowany jodem TiO2 pozwala osiągnąć lepsze parametry PCE (1,67%) i prąd zwarcia...