Filters
total: 1255
-
Catalog
- Publications 889 available results
- Journals 119 available results
- Conferences 81 available results
- Publishing Houses 1 available results
- People 51 available results
- Inventions 5 available results
- Projects 11 available results
- e-Learning Courses 34 available results
- Events 1 available results
- Open Research Data 63 available results
displaying 1000 best results Help
Search results for: JOB SECURITY
-
Transient detection for speech coding applications
PublicationSignal quality in speech codecs may be improved by selecting transients from speech signal and encoding them using a suitable method. This paper presents an algorithm for transient detection in speech signal. This algorithm operates in several frequency bands. Transient detection functions are calculated from energy measured in short frames of the signal. The final selection of transient frames is based on results of detection...
-
EU-Russian Relations and the Eastern Enlargement: Integration or Isolation
Publication -
Democratisation and Institutional Development in Romania after 1989
Publication -
Multi-Stage Video Analysis Framework
PublicationThe chapter is organized as follows. Section 2 presents the general structure of the proposed framework and a method of data exchange between system elements. Section 3 is describing the low-level analysis modules for detection and tracking of moving objects. In Section 4 we present the object classification module. Sections 5 and 6 describe specialized modules for detection and recognition of faces and license plates, respectively....
-
Recognition of hazardous acoustic events employing parallel processing on a supercomputing cluster . Rozpoznawanie niebezpiecznych zdarzeń dźwiękowych z wykorzystaniem równoległego przetwarzania na klastrze superkomputerowym
PublicationA method for automatic recognition of hazardous acoustic events operating on a super computing cluster is introduced. The methods employed for detecting and classifying the acoustic events are outlined. The evaluation of the recognition engine is provided: both on the training set and using real-life signals. The algorithms yield sufficient performance in practical conditions to be employed in security surveillance systems. The...
-
Standards Conformity Framework in comparison with contemporary methods supporting standards application
PublicationAchieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is spent on fulfilment of safety and security requirements. However, standards application is not supported sufficiently by the tools available on the market. Therefore, Standards Conformity Framework (SCF) containing methods and tools which provide support...
-
The role and importance of WIMAX mobile system as a high-performance data transfer technology in wireless sensor networks for wide area monitoring applications
PublicationThe study discuses basic features and functional design of WiMAX Mobile system, based on the IEEE 802.16e (Release 1.5 Rev. 2.0) standard. The analysis has been made in terms of ability to use this system to transmit video stream related to monitoringof large agglomeration areas. What is more, the study includes comparison of technical parameters of WiMAX Mobile system with competitive systems such as: HSPA+ and UMTS-LTE, which...
-
A Novel Multicast Architecture of Programmable Networks
PublicationIn the paper a multicast architecture for programmable networks based on separation of group management and network control tasks is proposed. Thanks to this separation, services which want to make use of multicast communications no longer have to implement low-level network functionalities and their operation is greatly simplified. Abstracting service’s view of the network into a fully connected cloud enables us to transparently...
-
Cybersecurity and Privacy in Standards for Smart Grids – a Comprehensive Survey
PublicationResilient information and communications technologies are a prerequisite for reliable operation of smart grid. In recent years, many standards for the new form of electricity network have been proposed, which results in operators and other smart grid stakeholders having difficulties in finding the documents which can be related to their particular problems. The purpose of this paper is to bring in all smart grid standards that...
-
Magnetism and structure of Li_xCoO2 and comparison to Na_xCoO2
PublicationW pracy dyskutowane są właściwości magnetyczne i strukturalne Li_xCoO2 dla 0.5< x< 1.0. Jon Co +4 znajduje się w stanie wysokospinowym w Li_xCoO2 dla zawartości litu od 0.94 do 1.00 i w stanie niskospinowym dla x od 0.50 do 0.78.
-
Energy policy and the role of bioenergy in Poland
PublicationPrzedstawiono sytuacje energetyczną kraju. Omówiono poszczególne sektory wytwarzania energii oraz zapotrzebowania na energię i paliwa. Omówiono przekształcenia sektorów energetycznych w Polsce na przestrzeni lat 1990-2002. Na tym tle przedstawiono techniczne, ekonomiczne, społeczne i prawne aspekty rozwoju energetyki źródeł odnawialnych a w szczególności opartych o bioenergię. Przedstawiono wnioski dla Polski płynące z dotychczasowych...
-
PROJEKT ZESPOŁOWY [DK][2023/24]
e-Learning CoursesCCCLECTURE and Classes: Power supply systems for industrial facilities. Devices and main circuits of MV power stations. Short-circuit calculation. Power protection automation. Security classification according to American ANSI standards used in the EU. Microprocessor protection relays. Drive systems for medium power and medium voltage pumps. Roving inverters. PROJECT: Design of a MV switching station for a medium-power pumping...
-
Hexakis(1-methylimidazole-kN3)iron(II) dichloride dihydrate
PublicationTytułowy związek, [Fe(C4H6N2)6]Cl2.2H2O jest izostrukturalny z odpowiednimi związkami Co, Ni i Ru. W kompleksowym kationie żelazo(II) jest koordynowane oktaedrycznie przez sześć ligandów 1-metyloimidazolowych. Jon ujemny jest agregatem dwóch jonów chlorkowych i dwóch cząsteczek wody połączonych wiązaniami wodorowymi.
-
Składniki mineralne
PublicationOpisano zawartość w żywności, przyswajalność oraz rolę w organizmie człowieka, tzw. składników mineralnych. Obecnie za składniki mineralne uważane są następujące pierwiastki: wapń, fosfor, siarka, sód, potas, chlor, magnez, żelazo, fluor, krzem, cynk, a także mangan, miedź, selen, jod, molibden, chrom, kobalt i bor.
-
Review of Structural Strength in the Event of a One-Leg Punch through for a Wind Turbine Installation Vessel
Publication -
Root Causes of Thin-Plate Buckling Damage at the Aft-End in Crude Oil Tanker and Verification through Buckling Analysis
Publication -
Global Structural Behavior and Leg Strength for Jack-Up Rigs with Varying Environmental Parameters
Publication -
Review the Ultimate Strength According to Welding Deformation Criteria of Thin Plates Under In-plane Compression
Publication -
Study of Heat Source Model and Residual Stress Caused by Welding in GMAW of Al Alloy
Publication -
Framework for RIDM within functional safety management process
PublicationThe functional safety management in life cycle is a complex process starting with identifying hazards and defining safety-related functions (SRFs) with risk assessment oriented at determining the safety integrity level. Another element of such life cycle is a verification of required SIL for designed safety-related system which implements safety function. Due to complexity of the problem, to overcome difficulties in safety-related...
-
Automatic Analysis of Trajectories of Moving Objects
PublicationOngoing monitoring is essential to providing security and safety of maritime and air operations. This paper presents the research in the area of automatic analysis of movement of unrestricted vehicles like ships and air-planes. The analysis is aimed at extraction of trajectory information, and the results can be used to identify anomalous behaviour in archived and real-time data. In this paper we focus on data acquired using the...
-
An Approach to the Detection of Bank Robbery Acts Employing Thermal Image Analysis
PublicationA novel approach to the detection of selected security-related events in bank monitoring systems is presented. Thermal camera images are used for the detection of people in difficult lighting conditions. Next, the algorithm analyses movement of objects detected in thermal or standard monitoring cameras using a method evolved from the motion history images algorithm. At the same time, thermal images are analyzed in order to detect...
-
Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues
PublicationManagement of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...
-
Public spaces connecting cities. Green and Blue Infrastructures potential.
PublicationA city fragmentation causes a lot of negative effects in urban environment such as: disconnecting the environmental, functional and compositional relations, a loss of urban compactness, chaotic development, visual chaos, a domination of technical landscape, reduction of security. This is why one of main challenges for urban planners is to connect the fragmented structures by creating friendly, attractive and safe public space....
-
VISUALIZATION OF SCANTER AND ARPA RADAR DATA IN THE DISTRIBUTED TELEINFORMATION SYSTEM FOR THE BORDER GUARD
PublicationMonitoring of country maritime border is an important task of the Border Guard. This activity can be enhanced with the use of the technology enabling gathering information from distributed sources, processing of that information and its visualization. The paper presents the next stage of development of the STRADAR project (Streaming of real-time data transmission in distributed dispatching and teleinformation systems of the Border...
-
Phan Van Hung Dr
PeoplePhan Van Hung graduated as an Engineer in Marine Navigation and Master Eng. Of Science in Navigation in 2010, 2013 from Vietnam Maritime University, respectively. He received a Doctor’s Degree, specializing in Maritime Safety System Engineering, at the Department of Maritime Transportation System, Mokpo National Maritime University, South Korea on August 24th, 2018. Since 2010, he has been with Vietnam Maritime University. His...
-
Company Culture, Knowledge Sharing and Organizational Performance. The Employee’s Perspective
PublicationKnowledge sharing, as a basic prerequisite for knowledge creation, is a dynamic social process characterized by profound human interactions. The process of knowledge sharing can be supported by organizational culture which is a set of values and norms giving identity to each enterprise. As a valuable element of intellectual capital, organizational culture contributes to achieving strategic business goals. The purpose of this article...
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublicationDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
Equitable and semi-equitable coloring of cubic graphs and its application in batch scheduling
PublicationIn the paper we consider the problems of equitable and semi-equitable coloring of vertices of cubic graphs. We show that in contrast to the equitable coloring, which is easy, the problem of semi-equitable coloring is NP- complete within a broad spectrum of graph parameters. This affects the complexity of batch scheduling of unit-length jobs with cubic incompatibility graph on three uniform processors to minimize...
-
Wpływ barier ochronnych na poziom bezpieczeństwa ruchu drogowego
PublicationWypadki drogowe wciąż stanowią znaczną przyczynę zgonów, dlatego bardzo ważnym jest odpowiednie kształtowanie otoczenia drogi – by mogło ono uzyskać miano „wybaczającego”. Artykuł stanowi wprowadzenie do tematyki drogowych barier ochronnych, i jest częścią pracy dyplomowej realizowanej na Politechnice Gdańskiej, w ramach której autorzy analizują zależności pomiędzy wypadkami a omawianymi urządzeniami BRD. W artykule przedstawiono...
-
Efficient bounds on quantum-communication rates via their reduced variants
PublicationWe investigate one-way communication scenarios where Bob operating on his component can transfer some subsystem to the environment. We define reduced versions of quantum-communication rates and, further, prove upper bounds on a one-way quantum secret key, distillable entanglement, and quantum-channel capacity by means of their reduced versions. It is shown that in some cases they drastically improve their estimation.
-
Nuclear power plant as a source of electrical energy and heat
PublicationIn this paper certain issues concerning usage of nuclear power plants as sources of not only electric power but also thermal energy will be discussed. For such a solution appeals most of all the need to limit harmful emissions of gases (including CO2) and ashes, which come from the process of burning fossil fuels, as well as the raising demand for network heat and chill. Additionally combined heat and power production brings measurable...
-
Bezpieczeństwo w IP Multimedia Subsystem
PublicationAbstrakt Artykuł jest trzecim w cyklu prac poświęconych IP Multimedia Subsystem (IMS) - po przedstawieniu architektury i usług IMS, odpowiednio w zeszytach 12/2009 oraz 2-3/2011 Przeglądu Telekomunikacyjnego i Wiadomości Telekomunikacyjnych. W obecnym artykule przedstawiono sposoby zapewnienia bezpieczeństwa przy realizacji tych usług.Artykuł został podzielony został na trzy części w których omówiono ogólne wyzwania bezpieczeństwa...
-
Eye-Gaze Tracking-Based Telepresence System for Videoconferencing
PublicationAn approach to the teleimmersive videoconferencing system enhanced by the pan-tilt-zoom (PTZ) camera, controlled by the eye-gaze tracking system, is presented in this paper. An overview of the existing telepresence systems, especially dedicated to videoconferencing is included. The presented approach is based on the CyberEye eye-gaze tracking system engineered at the Multimedia Systems Department (MSD) of Gdańsk University of Technology...
-
Expert assessment of arguments: a method and its experimental evaluation
PublicationArgument structures are commonly used to develop and present cases for safety, security and other properties. Such argument structures tend to grow excessively. To deal with this problem, appropriate methods of their assessment are required. Two objectives are of particular interest: (1) systematic and explicit assessment of the compelling power of an argument, and (2) communication of the result of such an assessment to relevant...
-
A framework for automatic detection of abandoned luggage in airport terminal
PublicationA framework for automatic detection of events in a video stream transmitted from a monitoring system is presented. The framework is based on the widely used background subtraction and object tracking algorithms. The authors elaborated an algorithm for detection of left and removed objects based on mor-phological processing and edge detection. The event detection algorithm collects and analyzes data of all the moving objects in...
-
Supporting Cybersecurity Compliance Assessment of Industrial Automation and Control System Components
PublicationThe chapter presents a case study demonstrating how security requirements of an Industrial Automation and Control System (IACS) component can be represented in a form of Protection Profile that is based on IEC 62443 standards and how compliance assessment of such component can be supported by explicitly representing a conformity argument in a form based on the OMG SACM meta-model. It is also demonstrated how an advanced argument...
-
Political Parties in the Digital World
PublicationThe aim of this report is to outline how digital technologies and digital media are redefining the way political parties fulfill their role as collective platforms for political participation of citizens, e.g. in relation to the parties’ decision-making processes, communication strategies, funding mechanisms, membership, information sharing, etc. and to highlight the existing international standards and good practices in this area....
-
In Situ Verification of Numerical Model of Water Hammer in Slurries
PublicationThis paper presents a numerical model of transient flow in a pressure slurry pipeline network with verification based on in situ measurements. The model, primarily verified in laboratory conditions, has been extended and applied to the case of a large and complex slurry pipeline network in Poland. In the model, the equivalent density concept was applied. In situ experiments were performed for various unsteady flow episodes, caused by...
-
Australasian Information Security Workshop 2007 (Privacy Enhancing Technologies)
Conferences -
IEEE International Conference on Intelligence for Homeland Security and Personal Safety
Conferences -
European Workshop on Security and Privacy in Ad -Hoc and Sensor Networks
Conferences -
KONCEPCJA WSPÓŁPRACY SYSTEMU STRUMIENIOWEJ TRANSMISJI DANYCH CZASU RZECZYWISTEGO STRADAR Z EUROPEJSKIM SYSTEMEM EUROSUR
PublicationPrzedstawiono koncepcję współpracy systemów STRADAR i EUROSUR, w celu wymiany informacji związanych z ochroną granic UE. Opisano cechy zrealizowanego demonstratora STRADAR i zasady komunikacji oraz bezpieczeństwa wymiany informacji w systemie EUROSUR. Opisano warianty wymiany infor-macji pomiędzy systemami STRADAR i EUROSUR, od najprostszych, możliwych do zastosowania w obecnej wersji STRADAR, do zautomatyzowanych, wymagających...
-
Self-employment of women: an opportunity or the last resort?
PublicationIt is believed that automatization and technological changes will be the main drivers of work in the future. At the same time, there is a growing discussion about new forms of employment, such as self-employment. It may be either perceived as a chance for empowerment, through creating new job opportunities, that were not reachable previously, or as precarious work, with less stability, higher risk, and uncertain income. The main...
-
REVERSE MODELLING OF MICROSEISMIC WAVES PROPAGATION FOR THE INTERPRETATION OF THE DATA FROM HYDRAULIC FRACTURING MONITORING IN POLAND
PublicationA hydraulic fracturing job was performed to stimulate gas flow from a horizontal wellbore located in Poland. The whole operation was overseen by means of microseismic monitoring. For this purpose, an array of 12000 geophones was deployed on ground in form of patches distributed unevenly in a region of 4km from the wellbore. The array was constantly recording seismic signals during whole fracturing processed. Such recorded signals...
-
Autistic Employees’ Technology-Based Workplace Accommodation Preferences Survey—Preliminary Findings
PublicationBackground: There has been an increase in the number of research studies focused on the design of accommodations aimed at improving the well-being and work performance of autistic employees. These accommodations took various forms; some of them were based on modification of management practices, for example, support in the area of effective communication, or involved modifications to the physical working environment aimed at limiting...
-
Process layout planning and optimised product range selection in manufacture of wooden construction sets
PublicationThis paper introduces a systematic deterministic framework for planning and the analysis of facility layouts aimed at manufacturing a variety of parts, as components of specific end products. The essence of the proposed approach lies in the decomposition of a traditional job-shop into layout modules of generic material flow patterns, that inherently yields improved efficiency of the entire system. It entails the use of a relevant...
-
Computer Controlled Systems Lab - 2023/2024
e-Learning CoursesComputer Controlled Systems Lab The course includes 5 individual projects and their laboratory implementation. The topics:- Job analysis and tuning digital servo- Usage of a PC computer and MatLab package for controlling the dynamic object as a model of the tethered helicopter- Use of C language and the PC to control the plant in real time- Use of assembly language, and a microcontroller to control the plant in real time- Use...
-
Computer Controlled Systems Lab - Nowy - Nowy
e-Learning CoursesComputer Controlled Systems Lab The course includes 5 individual projects and their laboratory implementation. The topics:- Job analysis and tuning digital servo- Usage of a PC computer and MatLab package for controlling the dynamic object as a model of the tethered helicopter- Use of C language and the PC to control the plant in real time- Use of assembly language, and a microcontroller to control the plant in real time- Use...
-
Using EO satellite data in Safe City and Coastal Zone web-GIS
PublicationThe paper presents a novel design of a web-based Safe City & Coastal Zone GIS (SCCZ-GIS) which integrates data acquired from different remote sensing and geospatial data sources for monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilizes several innovative technologies and directly co-operates with different remote sensing data sources and services, like a satellite ground station...