Filters
total: 3166
-
Catalog
- Publications 2214 available results
- Journals 157 available results
- Conferences 90 available results
- Publishing Houses 5 available results
- People 95 available results
- Projects 24 available results
- Research Teams 1 available results
- Research Equipment 1 available results
- e-Learning Courses 310 available results
- Events 19 available results
- Open Research Data 250 available results
displaying 1000 best results Help
Search results for: IOT SECURITY
-
Monika Wilamowska-Zawłocka dr hab. inż.
PeopleDr Monika WILAMOWSKA-ZAWŁOCKA obtained her PhD in Chemistry in 2011 at Faculty of Chemistry, Gdańsk University of Technology. She then was a post-doctoral fellow at Technische Universität Darmstadt, Germany. Since 2013 she has worked at Gdańsk University of Technology, since 2019 as an Associate Professor. Her research interests include composite materials for energy storage devices, especially for lithium-ion and sodium-ion batteries,...
-
The methods of secure data transmission in the KNX system
PublicationThe article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.
-
Design and Performance Evaluation of the Energy Subsystem of a Hybrid Light andWave Energy Harvester
PublicationThe paper presents the design and performance of an energy subsystem (ES) dedicated to hybrid energy harvesters (HEHs): wave energy converters (WECs) combined with photovoltaic panels (PVPs). The considered ES is intended for compact HEHs powering autonomous end-node devices in distributed IoT networks. The designed ES was tested experimentally and evaluated in relation to the mobile and wireless distributed communication use case....
-
Jan Godlewski prof. dr hab.
People -
Piotr Szczuko dr hab. inż.
PeoplePiotr Szczuko received his M.Sc. degree in 2002. His thesis was dedicated to examination of correlation phenomena between perception of sound and vision for surround sound and digital image. He finished Ph.D. studies in 2007 and one year later completed a dissertation "Application of Fuzzy Rules in Computer Character Animation" that received award of Prime Minister of Poland. His interests include: processing of audio and video, computer...
-
Surface characteristics of glass fibres covered with an aluminum layer after a chemical modification process using secondary ion mass spectrometry (SIMS) and atomic force microscopy (AFM)
PublicationPrzedstawiono wyniki z badań powierzchni modyfikowanych włókien szklanych (przed i po procesie chemicznej modyfikacji ich powierzchni), które są kandydatem na przyszły oryginalny bezmatrycowy materiał odniesienia lotnych analitów etenu (C2H4) metodami spektrometrii mas jonów wtórnych oraz mikroskopii sił atomowych. Badania miały na celu obserwację zmian oraz procesów, jakie zaszły na powierzchni włókien szklanych pokrytych...
-
Ekspertyza geotechniczna dot. wzmocnienia podłoża pod place składowe i torowisko zwałowarko-ładowarki Terminalu Przeładunkowo-Składowego Rudy w Porcie Północnym w Gdańsku
PublicationEkspertyza dotyczy wzmocnienia podłoża gruntowego pod składy materiałów sypkich oraz torowisko w Porcie Północnym w Gdańsku. Przeanalizowano warunki odkształcenia i osiadania podłoża oraz jego nośność.
-
Facile synthesis of accordion-like porous carbon from waste PET bottles-based MIL-53(Al) and its application for high-performance Zn-ion capacitor
Publication -
Blowing Kinetics, Pressure Resistance, Thermal Stability, and Relaxation of the Amorphous Phase of the PET Container in the SBM Process with Hot and Cold Mold. Part I: Research Methodology and Results
PublicationThe technology of filling drinks without preservatives (such as fresh juices, iced tea drinks, vitaminized drinks) is carried out using hot filling. Mainly due to the production costs and lower carbon footprint, polyethylene terephthalate bottles, commonly called PET, are increasingly used in this technology. In this paper, the main aim is to describe the statistical analysis methodology of the influence of the temperature of the...
-
Design and Preparation of Magnetically-Oriented Poly(styr-co-MMA)-3MPS Capped Fe(ZnO) Hybrid Microspheres for Ion Exchange Removal of Toxic Pollutants from Wastewater
PublicationIn this work, polymeric microspheres derived from polystyrene-co-methyl methacrylate embedded with magnetic ZnO nanoparticles (poly(styrene-co-MMA)-3MPS-Fe (ZnO)) were synthesized using the suspension polymerization method. The surfaces of polymeric Fe(ZnO) microspheres were improved by functionalization with amino and sulphonate groups. The physicochemical analysis indicated a large number of positively charged (anion exchange)...
-
Rapid ion-exchange matrix removal for a decrease of detection limits in the analysis of salt-rich reservoir waters for fluorobenzoic acids by liquid chromatography coupled with tandem mass spectrometry
PublicationA matrix removal procedure with ion-exchange resin prior to analysis for 18 fluorinated benzoic acids (FBAs) tracers in saline (>25% salt) reservoir water was optimized. The elimination of >98% of salt and the simultaneous matrix sample cleanup allowed the direct analysis using the supernatant by liquid chromatography coupled with tandem mass spectrometry (LC-MS/MS). This resulted in a gain in detection limits for most of the tracers...
-
Internet Rzeczy a internetowy protokół sieciowy IP
PublicationW pracy omówiono problemy wdrażania IoT z punktu widzenia zapewniania komunikacji. Przedstawiono podstawowe wymagania jakie systemy IoT stawiają sieciowym rozwiązaniom protokolarnym. Opisano IPv6 pod kątem możliwości spełnienia tych wymagań. Wskazano na konieczność rozpowszechnienia protokołu sieciowego IPv6. Przedstawiono aktualny stan wdrożenia IPv6
-
Zarządzanie bezpieczeństwem informacji - specjalność ISI -2022
e-Learning CoursesThe aim of the course is for a student to develop the understanding of terminology, objectives and scope of information security management and privacy management and to learn about related assurance and assessment methods.
-
Zarządzanie bezpieczeństwem informacji - specjalność ISI -2023
e-Learning CoursesThe aim of the course is for a student to develop the understanding of terminology, objectives and scope of information security management and privacy management and to learn about related assurance and assessment methods.
-
Zarządzanie bezpieczeństwem informacji - specjalność ISI -2024
e-Learning CoursesThe aim of the course is for a student to develop the understanding of terminology, objectives and scope of information security management and privacy management and to learn about related assurance and assessment methods.
-
Michal Piechowicz dr
PeopleAdjunct at the Department of European Studies at the Faculty of Political Science and Security Studies. Doctoral thesis defended in 2011. Author of publications in the field of European integration and security. Research interests focus on issues related to the decision-making processes and EU defense and security policy issues. I'm visiting the CEEs constantly. My ongoing and future-oriented goal is establishing research and trust-based...
-
Sławomir Jerzy Ambroziak dr hab. inż.
PeopleSławomir J. Ambroziak was born in Poland, in 1982. He received the M.Sc., Ph.D. and D.Sc. degrees in radio communication from Gdańsk University of Technology (Gdańsk Tech), Poland, in 2008, 2013, and 2020 respectively. Since 2008 he is with the Department of Radiocommunication Systems and Networks of the Gdańsk Tech: 2008-2013 as Research Assistant, 2013-2020 as Assistant Professor, and since 2020 as Associate Professor. He is...
-
Income obtained according to particular rates only by taxpayers conducting non-agricultural business activity 2015
Open Research DataTaxation in the form of a lump sum on recorded revenues does not apply to certain types of activity, regardless of their size. We are talking about taxpayers who achieve revenue in whole or in part, among others from on account of running pharmacies, activities in the field of buying and selling foreign exchange values, activities in the field of trade...
-
ACM Workshop on Hot Topics in Networks
Conferences -
ICT in Education, Research, and Industrial Applications
Conferences -
Theory and implementation of a virtualisation level Future Internet defence in depth architecture
PublicationAn EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...
-
Validation of a virtual test environment for C2X communication under radio jamming conditions
PublicationIn this paper, we propose a novel car-2-x communication security testing methodology in the physical layer of wireless systems. The approach is dedicated to automated testing of autonomous vehicles and it is essential for such complex systems operation, especially with regard to safety and security issues. It is based on scenario-driven testing in virtual and real test environments created from collected or simulated data. The...
-
Ekspertyza geotechniczna dot. zabezpieczenia przed dopływem wód gruntowych budynku Domu Studenckiego nr 4 Politechniki Gdańskiej w Gdańsku przy ul. Do Studzienki 61
PublicationEkspertyza dot. przyczyn dopływu wód gruntowych do budynku i zabezpieczenia przed dalszą degradacją budynku.
-
Wstępna opinia geotechniczna dot. terenu inwestycji Budynku Laboratoryjno-Dydaktycznego Wydziału Elektrotechniki i Automatyki Politechniki Gdańskiej -''LINTE'' przy ul. Sobieskiego 7 w Gdańsku
PublicationZawiera analizę warunków geotechnicznych wraz z obliczeniami nośności podłoża opracowanymi na podstawie materiałów archiwalnych.
-
Cross-Sectoral Inter-Country Linkages under the Belt and Road Initiative: Chinese ICT Services Value Added Inflows to Manufacturing Exports in the New Eurasian Land Bridge Economies
Publication -
Lower rim substituted tert-Butylcalix[4]arenes. Part 13. Interaction of calix-hydroxamates with Fe(III) and Pb(II); studies in ion-selective membrane electrodes (ISE)
PublicationPrzedmiotem pracy są badania oddziaływań pomiędzy trzema wybranymi hydroksamowymi pochodnymi t-butylo-kaliks[4]arenu i jonami metali z wykorzystaniem membranowych elektrod jonoselektywnych (ISE). Elektrody zawierające jako materiał aktywny wymienione związki jonoforowe charakteryzują się nernstowskim nachyleniem i szerokim zakresem liniowości na jony Pb(II), a także dobrą selektywnością na jony Pb(II)w stosunku do jonów UO2(II),...
-
New “one‐pot” Pd(II) and Zn(II) complexes of Schiff bases, derivatives of 1‐amino‐1‐deoxy‐d‐sorbitol: Spectroscopic studies and biological and catalytic activities
Publication -
Magnetic anisotropy and structural flexibility in the f ield-induced single ion magnets [Co{(OPPh2) (EPPh2)N}2], E = S, Se, explored by experimental and computational methods
PublicationDuring the last few years, a large number of mononuclear Co(II) complexes of various coordination geometries have been explored as potential single ion magnets (SIMs). In the work presented herein, the Co(II) S = 3/2 tetrahedral [Co{(OPPh2)(EPPh2)N}2], E = S, Se, complexes (abbreviated as CoO2E2), bearing chalcogenated mixed donor-atom imidodiphosphinato ligands, were studied by both experimental and computational techniques. Specifically,...
-
In vitro biological evaluation of a novel folic acid-targeted receptor quantum dot−β−cyclodextrin carrier for C-2028 unsymmetrical bisacridine in the treatment of human lung and prostate cancers
PublicationTraditional small-molecule chemotherapeutics usually do not distinguish tumors from healthy tissues. However, nanotechnology creates nanocarriers that selectively deliver drugs to their site of action. This work is the next step in the development of the quantum dot−β−cyclodextrin−folic acid (QD−β−CD−FA) platform for targeted and selected delivery of C−2028 unsymmetrical bisacridine in cancer therapy.Herein, we report an initial...
-
Blowing Kinetics, Pressure Resistance, Thermal Stability, and Relaxation of the Amorphous Phase of the PET Container in the SBM Process with Hot and Cold Mold. Part II: Statistical Analysis and Interpretation of Tests
PublicationThe technology of filling drinks without preservatives (such as fresh juices, iced tea drinks, and vitaminized drinks) is carried out using hot filling. Mainly due to the production costs and lower carbon footprint, polyethylene terephthalate (PET) bottles are increasingly used in this technology. In this paper, the main aim is to describe and interpret the results of statistical analysis of the influence of the temperature of...
-
Ability of paramedics to perform intraosseous access. A randomized cadaver study comparing EZ-IO® and NIO® devices
Publication -
Edible black ant Smith (Carebara vidua) as human food – A systematic review
PublicationMeeting food security is one of the major global challenges to ensure sufficient supply of food for current and future generations, considering increasing population growth and climate change issues. Consequently, the consumption of edible insects as an alternative food source has recently gained global attention for combating global food insecurity. The present review aims to provide information on the recent progress in consumption...
-
Exemplaria classica (Formerly: Exemplaria. Revista Int. de Literat. Comparada 1138-1922)
Journals -
Smart Services supporting Drivers in Effective Cars Parking
PublicationThe paper shows how to design and implement intelligent, service oriented systems for management of free places in distributed car parks. The idea of SOA technology is widely used. It is assumed that a state of every car park is automatically determined by a special electronic infrastructure including IoT solutions. The information received from such an infrastructure is sent to the main management system, which processes it and,...
-
Mechanizmy bezpieczeństwa transmisji w systemie netBaltic
Publicationartykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
The Decisional DNA-Based Smart Bike for Internet of Things
PublicationIn this paper, we introduce a novel application of the Internet of Things, the Decisional DNAbased Smart Bike. The Decisional DNA is a domain-independent, flexible and standard knowledge representation structure; it allows its domains to acquire and store experiential knowledge and formal decision events in an explicit way. By using Decisional DNA, the sensor-equipped bicycle is able to learn its user’s weight, riding habits, etc....
-
Definiowany programowo uniwersalny interfejs radiowy inteligentnych urządzeń internetu rzeczy
PublicationIntensywny wzrost liczby urządzeń komunikujących się ze sobą na dużym obszarze wymaga opracowywania i realizacji rozwiązań systemowych. Z tego względu organizacja 3GPP zdefiniowała wąskopasmowy interfejs radiowy NB-IoT (Narrowband Internet of Things) będący podsystemem LTE (Long Term Evolution) na potrzeby zastosowań IoT niewymagających dużych przepływności. W niniejszym artykule przedstawiono charakterystykę systemu NB-IoT, a...
-
Lower Rim Substitutedp-tert-Butyl-Calix[4]arene. Part 15. Pb(II)-Ion-Selective Electrodes Based onp-tert-Butyl-calix[4]arene Thioamides
Publication -
Correction: Bocheńska, K. et al. Lysosome Alterations in the Human Epithelial Cell Line HaCaT and Skin Specimens: Relevance to Psoriasis. Int. J. Mol. Sci. 2019, 20, 2255
Publication -
Feature extraction in detection and recognition of graphical objects
PublicationDetection and recognition of graphic objects in images are of great and growing importance in many areas, such as medical and industrial diagnostics, control systems in automation and robotics, or various types of security systems, including biometric security systems related to the recognition of the face or iris of the eye. In addition, there are all systems that facilitate the personal life of the blind people, visually impaired...
-
Architektura bezpieczeństwa systemu netBaltic
PublicationW artykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Estimation of transmission quality in cellular systems based on indicators measured by the radio module
PublicationThe article presents a measurement stand for testing transmission quality in cellular systems such as LTE, NB-IoT, UMTS and GSM. The results of BLER and throughput measurements for various propagation conditions as well as results of quality indicators appropriate for mentioned technologies measured by commercial radio module are presented. Those measurements were utilized to analyze the possibility of estimating the transmission...
-
Agnieszka Witkowska dr hab. inż.
People -
Sławomir Milewski prof. dr hab. inż.
PeopleSławomir Milewski, born in 1955 in Puck, Poland, graduated in 1979 in Chemistry from the Faculty of Chemistry, Gdańsk University of Technology (GUT). In 1984 was employed at the Department of Pharmaceutical Technology and Biochemistry. In 1985 he got his PhD, in 1994 became a DSc (habilitation) and in 2002 got the professorship in chemical sciences. Currently he is a full professor and Head of the Department of Pharmaceutical Technology...
-
Kontekstowo zorientowany model bezpieczeństwa systemów internetowych
PublicationW rozprawie dokonano analizy usługowych systemów internetowych pod względem bezpieczeństwa. Przedstawiono autorskie uniwersalne modele bezpieczeństwa CoRBAC oraz jego rozszerzenie TCoRBAC, będące rozwinięciem tradycyjnego modelu RBAC. Uwzględniono analizę szeroko rozumianego kontekstu funkcjonowania systemu oraz poziom jego zaufania do użytkownika. Opracowano metodę wyznaczania dwóch parametrów: zaufania do systemu (λ) będącego...
-
Adolf Balas prof. dr hab. inż.
People -
Simulating Malware with MAlSim
PublicationThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating malware with MAlSim
PublicationThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
New RFID readers for scalable RFID system
PublicationRFID systems gives the opportunity to have wide access control integrated with the monitoring of people and goods flow. System's scalability is one of the most important features in such systems as they enable large scale deployments. The concept of the proposed reader's architecture employs new RFID transceivers and microcontrollers, security algorithms which gives very high functionality at low price. Special treatment of system's...
-
The symmetric extendibility of quantum states
PublicationStudies on the symmetric extendibility of quantum states have become particularly important in the context of the analysis of one-way quantum measures of entanglement, and the distillability and security of quantum protocols. In this paper we analyze composite systems containing a symmetric extendible part, with particular attention devoted to the one-way security of such systems. Further, we introduce a new one-way entanglement...