Filters
total: 2421
-
Catalog
displaying 1000 best results Help
Search results for: BIOLOGICAL THREATS
-
Wireless systems of threats monitoring
Publication -
Wireless Systems of Threats Monitoring
Publication -
Wireless systems of threats monitoring
Publication -
Wireless systems of threats monitoring
Publication -
Wireless systems of threats monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Wireless Systems of Threats Monitoring
PublicationConcept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Wireless systems of threats monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Wireless Systems of Threats Monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...
-
Malware - a survey on threats and mitigation techniques
PublicationThis paper presents up-to-date knowledge related to malware – malicious software. Firstly the definitions are presented and discussed briefly. Next, the paper presents a bit of motivation along with the malware fighting objectives. Malware poses an emerging threat in accordance to smart grids in general and advanced metering infrastructure in particular. The discussion is then directed towards known taxonomy along with a new proposal...
-
Mobile Security: Threats and Best Practices
PublicationCommunicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...
-
ChatGPT - opportunities or threats in the educational process
Publication -
INTERNATIONAL JOURNAL OF BIOLOGICAL MACROMOLECULES
Journals -
LIGHT POLLUTION IN THE CONTEXT OF THREATS TO THE WILDLIFE CORRIDORS
PublicationAccess to remote sensing night-time imagery allows for modeling of light pollution Increasingly, data on the propagation of artificial light are a source of interesting information for different fields of science and affect the planning of economic development. The article presents the problem of light pollution in the context of threats to the wildlife corridors in Poland. Wildlife corridors are areas that allow safe migration...
-
Threats to Rural Landscape and Its Protection in Poland
PublicationThe article describes the premises and conditions for the implementation of a pro-landscape spatial policy in rural areas in Poland. It presents the erosion of spatial order in a large part of the country’s territory. Firstly, the state of protection of the rural landscape and the legal aspects of shaping the space of rural areas are described. Secondly, the location is depicted, and the main physiognomic and environmental threats...
-
Digital Threats: Research and Practice
Journals -
JOURNAL OF BIOLOGICAL CHEMISTRY
Journals -
Investigation of Noise Threats and Their Impact on Hearing in Selected Schools
PublicationNoise measurements conducted in selected schools in Gdansk area are presented in this paper. The main aim of this research was to determine noise threats at schools. Some objective measurements of the acoustic climate were performed employing a noise monitoring station engineered at the Multimedia System Department, Gdansk University of Technology. Simultaneously, subjective noise annoyance examinations were carried out among pupils...
-
Early detection of imminent threats in social relation graphs
PublicationWczesne wykrywanie zagrożeń i anomalii w sieciach społecznych jest dziś prawdziwym wyzwaniem. Ludzie w realnym świecie tworzą wiele złożonych relacji społecznych, które mogą być przedstawione za pomocą grafów, w których węzły reprezentują aktorów (pojedyncze osoby lub organizacje) a krawędzie wskazują na powiązania pomiędzy nimi. Analiza nieustannie zmieniających się relacji pomiędzy aktorami może wskazać konkretne nadciągające...
-
ECOLOGICAL ENGINEERING
Journals -
Białowieża Forest: A new threat
Publication -
WP1 of INDECT Project: Intelligent Monitoring and Automatic Detection of Threats
Publication -
WP1: Intelligent Monitoring and Automatic Detection of Threats - partners cooperation
Publication -
WP1: Intelligent monitoring and automatic detection of threats -introduction to the WP1
Publication -
A video monitoring system using ontology-driven identification of threats
PublicationIn this paper, we present a video monitoring systemthat leverages image recognition and ontological reasoningabout threats. In the solution, an image processing subsystemuses video recording of a monitored area and recognizesknown concepts in scenes. Then, a reasoning subsystem uses anontological description of security conditions and informationfrom image recognition to check if a violation of a conditionhas occurred. If a threat...
-
Imminent threats analysis and security level evaluation in social networks
PublicationRozprawa doktorska poświęcona jest analizie nadciągających zagrożeń w sieciach społecznych. Dotyczy to takich zjawisk jak spam, phishing, kradzież tożsamości czy ataki na systemy reputacji w serwisach aukcji internetowych. W pracy zaproponowano metodę pozwalającą na wczesne wykrycie zagrożeń w sieciach społecznych w oparciu o zdefiniowane modele zachowań aktorów sieci. Modele zachowań tworzone są za pomocą podgrafów wzorcowych...
-
Ad hoc routing protocols - security objectives, threats and solution
PublicationZaprezentowano przykładowe strategie routingu stosowane w bezprzewodowych sieciach ad-hoc z transmisją wieloetapową. Dokonanao przegladu protokołow routingu, zidentyfikowano podstawowe typy ataków i zagrożenia integralności i poufności transmisji w sieciach bezprzewodowych. Przedstawiono przykładowe rozwiazania algorytmów routingu.
-
Teaching Architecture – contemporary challenges and threats in the complexity of built environment
PublicationThe complexity of the modern built environment is a problem n ot only of architectural and urban issues. This issue extends to many othe r disciplines as well as covering a wide range of social engagements. The idea of writing this pa per is generally initiated by the debate which took place in Gdańs k on 22.01.2016, and was prepar ed in order to meet representatives of the four circles of interest...
-
Carsharing - Opportunities and Threats for Cities: Proposals of Solutions for Urban Policy
PublicationThe carsharing of a current generation is a short-term car renting service with a capability to find in the nearest surrounding a fleet car parked anywhere in the public space where the previous user left it, as well as to book, open, rent and pay of, with the use of a dedicated mobile application. Nowadays, only a minority of municipalities is considering implementing the carsharing in their policies. The lack of awareness of...
-
BIOLOGICAL TRACE ELEMENT RESEARCH
Journals -
BIOLOGICAL CONSERVATION
Journals -
Automatic audio-visual threat detection
PublicationThe concept, practical realization and application of a system for detection and classification of hazardous situations based on multimodal sound and vision analysis are presented. The device consists of new kind multichannel miniature sound intensity sensors, digital Pan Tilt Zoom and fixed cameras and a bundle of signal processing algorithms. The simultaneous analysis of multimodal signals can significantly improve the accuracy...
-
Ontology oriented threat detection system
PublicationW niniejszym artykule przedstawiony jest projekt opartego o ntologię systemu wykrywania zagrożeń w różnego typu monitorowanych środowiskach (OOTDS). Zakłada się, że umieszczone w środowisku czujniki na bieżąco dostarczają systemowi zdarzeń odzwierciedlających zmiany zachodzące w środowisku. Korzystając z sieci asynchronicznych bloków rosnącej złożoności OOTDS dokonuje analizy otrzymanych zdarzeń. Bloki wstępnego przetwarzania konwertują...
-
Shopping Centres - a Threat to Public Spaces?
PublicationObszary wewnętrznych przestrzeni pieszych w centrach handlowych stają się substytutami śródmiejskich przestrzeni publicznych miast. Mimo ich stylizacji architektonicznej na ulice handlowe nie spełniają takiej samej funkcji jak przestrzenie tradycyjne. Powoduje to zagrożenia związane ze wzrostem znaczenia konsumpcjonizmu i tworzenia zamkniętych przestrzeni prywatnych niedostępnych dla całego społeczeństwa. Mimo to mogą one być elementami...
-
Threat intelligence platform for the energy sector
PublicationIn recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...
-
Investigation of noise threats and their impact on hearing in selected schools - a pilot study.
PublicationNoise measurements conducted in selected schools in Gdansk area are presented in this paper. The main aim of this research was to determine noise threats at schools. Some objective measurements of the acoustic climate were performed employing a noise monitoring station engineered at the Multimedia System Department, Gdansk University of Technology. Simultaneously, subjective noise annoyance examinations were carried out among pupils...
-
BIOLOGICALS
Journals -
Operational analysis of threats to the security of NATO’s eastern flank. Context of hybrid activities
Publication -
Transport of dangerous goods by rail, and threats to the subsoil of the railway surface in the event of a disaster
PublicationIn Poland, in 2020, the mass of dangerous goods (loads) transported by rail was 26 151.06 thousand tone. This translated into the performance of 8 899 691.89 thousand tone - km of transport performance. In 2020, these figures accounted for 11.72% of the weight of goods transported by rail. The situation is similar in other countries around the world. With such a large volume of transport of dangerous...
-
Threats to Armenia’s Security in the National Strategy and Practice with Special Emphasis on External Security,
PublicationThe national security strategy adopted in 2007 provided a detailed definition of security and identified its threats. The key threat to the Armenian state was considered to be the Nagorno-Karabakh conflict. The document indicated the Collective Security Treaty Organisation main guarantor of security, with Russia being Armenia’s main partner in bilateral relations. The second position in the strategy was assigned to cooperation...
-
Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs
PublicationIn ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...
-
Ionic liquids - greener solvents or environmental threat?
PublicationZe względu na niemierzalnie niską prężność par ciecze jonowe były uważane za 'zielone rozpuszczalniki'. Ich zastosowanie w technologiach (bio)chemicznych przynosi korzyści nie tylko ekologiczne ale również ekonomiczne. Niemniej jednak zanieczyszczenie środowiska poprzez przedostanie się cieczy jonowych do gleb i wód gruntowych wraz ze ściekami/odciekami przemysłowymi lub w wyniku przypadkowych rozlewów stanowi realne zagrożenie....
-
Financial threat profiles of industrial enterprises in Poland
Publication -
Zika virus infection – a new epidemic threat
Publication -
BIOLOGICAL CONTROL
Journals -
BIOLOGICAL BULLETIN
Journals -
BIOLOGICAL PSYCHIATRY
Journals -
BIOLOGICAL CYBERNETICS
Journals -
Biological Communications
Journals -
Biological Theory
Journals -
Monitoring of Selected CBRN Threats in the Air in Industrial Areas with the Use of Unmanned Aerial Vehicles
Publication