Filters
total: 942
-
Catalog
- Publications 661 available results
- Journals 109 available results
- Conferences 80 available results
- Publishing Houses 1 available results
- People 42 available results
- Inventions 1 available results
- Projects 14 available results
- Laboratories 1 available results
- e-Learning Courses 13 available results
- Events 2 available results
- Open Research Data 18 available results
Search results for: RFID SECURITY
-
ACM Conference on Computer and Communications Security
Conferences -
Annual Computer Security Applications Conference
Conferences -
European Symposium On Research In Computer Security
Conferences -
International Conference on Availability, Reliability and Security
Conferences -
Implementing decisional trust: a first approach for smart reliable systems
PublicationIn this article, we introduce the necessary elements that must be integrated in order to achieve a decisional technology that is trustworthy. Thus, we refer to such technology as decisional trust. For us, decisional trust can be achieved through the use of elements such as the decisional DNA, reflexive ontologies, and security models; and therefore, we present in this article a framework that was used for the implementation of...
-
Asia Conference on Information, Computer and Communications Security (ACM Symposium on Information, Computer and Communications Security)
Conferences -
60 GHz Microstrip Van Atta Arrays for Millimeter Wave Identification and Localization
PublicationIn this paper performance comparison of co-polarized and cross-polarized microstrip Van Atta arrays working in the 60 GHz frequency range is presented. They can be treated as simple chipless RFID tags with frequency response based identification. Tags with three different nominal resonance frequencies of 57, 62 and 67 GHz are designed by scaling optimized base model. Designed 62 GHz co-polarized and cross-polarized arrays with...
-
Resolving conflicts in object tracking for automatic detection of events in video
PublicationAn algorithm for resolving conflicts in tracking of moving objects is presented. The proposed approach utilizes predicted states calculated by Kalman filters for estimation of trackers position, then it uses color and texture descriptors in order to match moving objects with trackers. Problematic situations, such as splitting objects, are addressed. Test results are presented and discussed. The algorithm may be used in the system...
-
Towards Cognitive and Perceptive Video Systems
PublicationIn this chapter we cover research and development issues related to smart cameras. We discuss challenges, new technologies and algorithms, applications and the evaluation of today’s technologies. We will cover problems related to software, hardware, communication, embedded and distributed systems, multi-modal sensors, privacy and security. We also discuss future trends and market expectations from the customer’s point of view.
-
Nodal cooperation equilibrium analysis in multi-hop wireless ad hoc networks with a reputation system
PublicationMotivated by the concerns of cooperation security, this work examines selected principles of state-of-the-art reputation systems for multi-hop ad hoc networks and their impact upon optimal strategies for rational nodes. An analytic framework is proposed and used for identification of effective cooperation-enforcement schemes. It is pointed out that optimum rather than high reputation can be expected to be sought by rational nodes.
-
Audible noise in ship’s electrical drive systems with frequency converters
Open Research DataThe presented dataset is part of research focusing on the impact of the ship's electrical drive systems with frequency converters on vibrations and the level of audible noise on ships.
-
Wielowymiarowa chromatografia cieczowa jako technika przygotowania próbki i oznaczania składu grupowego skomplikowanych mieszanin substancji
PublicationCelem ogólnym niniejszej rozprawy doktorskiej jest opanowanie problemu doboru optymalnych warunków przygotowania próbki, z uwzględnieniem rozdzielania grupowego w celu zapewnienia możliwości oznaczania zawartości wybranych analitów lub grup analitów w materiałach stanowiących skomplikowane mieszaniny bardzo wielu substancji. W części wprowadzającej pracy dokonano przeglądu i poddano krytycznej ocenie istniejące techniki i metody...
-
Secure Quaternion Feistel Cipher for DICOM Images
PublicationAn improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...
-
A Paradigm for HV, MV, LV Distribution Grid Development Planning
PublicationIn the literature, including that relating to businesses in the energy (and power) sector, the concept of these organizations’ operating paradigm may be found. The paper discusses the concept of the paradigm, with a focus on the power grid development planning paradigm. Against this background, issues related to energy security and power systems development trends and problems are presented. A new paradigm is proposed for distribution...
-
Maciej Szczodrak dr inż.
People -
LS-DYNA simulations of the impacts of a 38-ton Heavy Goods Vehicle into a road cable barrier
PublicationNowadays, more and more attention is being paid to safety on roads and motorways. It is due to the continuous development of road and motorway network and a significant increase of the number of vehicles on roads. To meet the expectations of improving road safety in Poland, the Road Innovations Development (RID) research programme was implemented in 2016. The aim of the RID 3A - Road Safety Equipment (RoSE) project is a comprehensive...
-
Determinanty bezpieczeństwa energetycznego Mołdawii: między Unią Europejską a Federacją Rosyjską
PublicationArtykuł ukazuje główne determinanty politycznego wymiaru bezpieczeństwa energetycznego Mołdawii wynikające ze stosunków z Unią Europejską i Federacją Rosyjską oraz ewolucji mołdawskiej sceny politycznej. Uwzględniając głównie rosnącą obecność rosyjskiego kapitału na mołdawskim rynku energetycznym od schyłku XX w., narastające zadłużenie za dostawy gazu wobec Gazpromu, rosyjskie szantaże energetyczne i handlowe, stopniowo wprowadzane...
-
Analiza bezpieczeństwa funkcjonalnego i ochrony informacji w rozproszonych systemach komputerowych pełniących funkcje sterowania i zabezpieczeń
PublicationW niniejszym artykule przedstawiona została problematyka związana z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej z uwzględnieniem zagadnień ochrony informacji. Powinny być one rozpatrywane w sposób zintegrowany w zależności od rodzaju komunikacji stosowanej do transmisji danych. W tym celu zaproponowano podział analizowanych systemów na trzy kategorie. Zaproponowane podejście...
-
Analiza bezpieczeństwa funkcjonalnego i ochrony informacji w rozproszonych systemach komputerowych pełniących funkcje sterowania i zabezpieczeń
PublicationW niniejszym artykule przedstawiona została problematyka związana z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej z uwzględnieniem zagadnień ochrony informacji. Powinny być one rozpatrywane w sposób zintegrowany w zależności od rodzaju komunikacji stosowanej do transmisji danych. W tym celu zaproponowano podział analizowanych systemów na trzy kategorie. Zaproponowane podejście...
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublicationThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
Computer -Aided Local Energy Planning Using ALEP-PL Software
PublicationThe issue of energy system planning, including the planning of local energy systems, is critical, since it affects the security of energy supplies in communities, regions, and consequently the security of energy supply within the country. Energy planning is a complex process that requires integration of different goals i.e. improvement of energy efficiency, increase in the share of renewables in the energy balance and CO2} emission...
-
IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA
Publication34 IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA Krystyna Gomółka Department of Social Sciences and Philosophy, Faculty of Management and Economics, Gdansk University of Technology Ul. G. Narutowicza 11/12, 80 - 233 Gdańsk, Poland Krystyna.Gomolka@zie.pg.gda.pl Abstract INOGATE Programme is one of the instruments designed for the implementation of the energy policy developed by the EU and...
-
Bezpieczeństwo transmisji danych w systemie KNX
PublicationW artykule przedstawiono wymagania dotyczące bezpieczeństwa transmisji danych w rozproszonych systemach automatyki budynków oraz wskazano potrzebę wprowadzenia mechanizmów ochrony informacji w protokole komunikacyjnym standardu KNX. Zaprezentowano trzy różne metody ochrony informacji opracowane dla systemu KNX: EIBsec, KNX Data Security oraz metodę autorską. Porównano ich właściwości oraz przedstawiono potencjalne obszary zastosowań.
-
Politiceskaja pressa o rosijsko-ukrainskich otnoszenijach i sobytiach w Krymu = Polish press covering russian- ukrainian relations and events in Crimea
PublicationThe paper made a review of opinions expressed by the most widely read Polish newpapers on the issue of Ukraine-Russian relations and events in Crimea in the period from early December 2013 till late March 2014. The author has brought to light attitudes to the events in Ukraine perceived while having in mind preserving security of Poland in political, economic and societal aspects. The EC policy towards the Russian Federation and...
-
Quaternion Encryption Method for Image and Video Transmission
PublicationQuaternions are hyper-complex numbers of rank 4. They are often applied to mechanics in 3D space and are considered to be one of the best ways of representing rotations. In this paper a quaternion encryption method, based on algorithm by Nagase et al. (2004) has been proposed. According to a computer-based simulation the results of the performed research yield a high level of security, which is additionally strengthened by the...
-
Bezpieczeństwo transmisji danych w systemie KNX
PublicationW artykule przedstawiono wymagania dotyczące bezpieczeństwa transmisji danych w rozproszonych systemach automatyki budynków oraz wskazano potrzebę wprowadzenia mechanizmów ochrony informacji w protokole komunikacyjnym standardu KNX. Zaprezentowano trzy różne metody ochrony informacji opracowane dla systemu KNX: EIBsec, KNX Data Security oraz metodę autorską. Porównano ich właściwości oraz przedstawiono potencjalne obszary zastosowań.
-
Distributed measurement system with data transmission secured using XXTEA algorithm
PublicationThe paper deals with wireless data transmission security in the distributed measurement and control system. An overview of cryptographic algorithms was presented paying special attention to the algorithm dedicated to units with low processing power, which is important due to minimization of energy consumption. Measurement modules equipped with simple microcontrollers send data wirelessly to the central unit. The transmission was...
-
Sailing Vessel Routing Considering Safety Zone and Penalty Time for Altering Course
PublicationIn this paper we introduce new model for simulation sea vessel routing. Besides a vessel types (polar diagram) and weather forecast, travel security and the number of maneuvers are considered. Based on these data both the minimal travelling costs and the minimal processing time are found for different vessels and different routes. To test our model the applications SailingAssistance wad improved. The obtained results shows that...
-
Current risk analysis and management issues in technical systems.
PublicationDealing with the reliability and safety of industrial hazardous plants requires taking into account relevant interdisciplinary scientific knowledge and some existing approaches based on so-called good engineering practice, also those included in the international standards and guidelines. In this article an approach is proposed how to integrate the functional safety concept with information security aspects in the design and management...
-
Marek Pszczoła dr hab. inż.
PeopleI am a Faculty member (Department of Highway and Transportation Engineering) at the Faculty of Civil and Environmental Engineering, Gdansk University of Technology, Poland). My main research interests include: low-temperature properties of asphalt mixtures, low temperature cracking assessment of pavement structures, road materials properties, thermal stress analysis, design of pavement structures, airfield design and analysis....
-
Wireless Systems of Threats Monitoring
PublicationThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...
-
A video monitoring system using ontology-driven identification of threats
PublicationIn this paper, we present a video monitoring systemthat leverages image recognition and ontological reasoningabout threats. In the solution, an image processing subsystemuses video recording of a monitored area and recognizesknown concepts in scenes. Then, a reasoning subsystem uses anontological description of security conditions and informationfrom image recognition to check if a violation of a conditionhas occurred. If a threat...
-
Inflammatory disease of cervix uteri - Female, 49 - Tissue image [6090730014731871]
Open Research DataThis is the histopathological image of CERVIX UTERI tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Inflammatory disease of cervix uteri - Female, 49 - Tissue image [6090730014735201]
Open Research DataThis is the histopathological image of CERVIX UTERI tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
A mobile hospital – its advantages and functional limitations
PublicationThe idea of a mobile hospital is not entirely new – the need for their use, ranging from military field hospitals to the charity or mass disaster tent cities, shows how much they are needed. While these cases can be reduced to a portable ambulatory unit with a limited scope of outpatient medical activities, a fully functional hospital is a system with a high degree of complexity far exceeding a regime of compact objects. Solutions...
-
Immersive Technologies that Aid Additive Manufacturing Processes in CBRN Defence Industry
PublicationTesting unique devices or their counterparts for CBRN (C-chemical, B-biological, R-radiological, N-nuclear) defense relies on additive manufacturing processes. Immersive technologies aid additive manufacturing. Their use not only helps understand the manufacturing processes, but also improves the design and quality of the products. This article aims to propose an approach to testing CBRN reconnaissance hand-held products developed...
-
Nowe metodyki oznaczania dodatków do paliw z zastosowaniem rozdzielenia wielopomiarowego = New procedures for fuel additives determination by multidimensional separation systems
PublicationW pracy przedstawiono wyniki badań nad opracowaniem metodyki oznaczania wybranych dodatków "myjących" w paliwie diesla. Porównano metodyki jednoetapowe z wykorzystaniem chromatografii gazowej z detektorem płomieniowo-jonizacyjnym (GC-FID) lub spektrometrem mas (GC-MS) oraz wysokosprawnej chromatografii cieczowej z detektorem UV z matrycą fotodiodową (HPLC-UV-DAD), z metodykami dwuetapowymi, w których do wstępnej izolacji składników...
-
Seismic response and performance prediction of steel buckling-restrained braced frames using machine-learning methods
PublicationNowadays, Buckling-Restrained Brace Frames (BRBFs) have been used as lateral force-resisting systems for low-, to mid-rise buildings. Residual Interstory Drift (RID) of BRBFs plays a key role in deciding to retrofit buildings after seismic excitation; however, existing formulas have limitations and cannot effectively help civil engineers, e.g., FEMA P-58, which is a conservative estimation method. Therefore, there is a need to...
-
Toward Intelligent Vehicle Intrusion Detection Using the Neural Knowledge DNA
PublicationIn this paper, we propose a novel intrusion detection approach using past driving experience and the neural knowledge DNA for in-vehicle information system security. The neural knowledge DNA is a novel knowledge representation method designed to support discovering, storing, reusing, improving, and sharing knowledge among machines and computing systems. We examine our approach for classifying malicious vehicle control commands...
-
Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile
PublicationThe paper introduces the AgileSafe method of selecting agile practices for software development projects that are constrained by assurance requirements resulting from safety and/or security related standards. Such requirements are represented by argumentation templates which explain how the evidence collected during agile practices implementation will support the conformity with the requirements. Application of the method is demonstrated...
-
Spatial Modelling in Environmental Analysis and Civil Engineering
PublicationAs can be seen, Spatial Modelling in Environmental Analysis and Civil Engineering applies to a multitude of applications. In an attempt to bring the topic closer to potential readers, the special issue referred to security methods, optimization of calculations, conducting measurements and empirical tests. Each article has made an original contribution to the development of practical science that can be replicated by researchers...
-
Determination of carbon monoxide, methane and carbon dioxide in refinery hydrogen gases and air by gas chromatography
PublicationW pracy przedstawiono metodę oznaczania śladowych zawartości tlenku węgla, metanu oraz dwutlenku węgla w rafineryjnych gazach wodorowych oraz powietrzu; granica oznaczalności metody wynosi odpowiednio 0,15, 0,15 oraz 0,20 mikro-gram/litr. Zaprezentowano w pracy prostą modyfikację chromatografu gazowego wyposażonego w detektor płomieniowo-jonizacyjny (FID). Zastosowano kolumnę typu PorapakQ, dodatkowo połączono szeregowo z krótką...
-
International Workshop on Critical Information Infrastructures Security
Conferences -
Symposium on Stabilization, Safety, and Security of Distributed Systems
Conferences -
IEEE International Conference on Intelligence and Security Informatics
Conferences -
IEEE Symposium on Computational Intelligence in Cyber Security
Conferences -
International Conference on Information Systems Security and Privacy
Conferences -
Usenix Network and Distributed System Security Symposium
Conferences -
International Conference on Security and Privacy for Communication Networks
Conferences -
IEEE Computer Security Foundations Symposium (was CSFW)
Conferences