Filters
total: 1680
-
Catalog
- Publications 1237 available results
- Journals 131 available results
- Conferences 82 available results
- Publishing Houses 1 available results
- People 43 available results
- Projects 9 available results
- e-Learning Courses 16 available results
- Events 3 available results
- Open Research Data 158 available results
displaying 1000 best results Help
Search results for: BATHING SECURITY
-
Using EO satellite data in Safe City and Coastal Zone web-GIS
PublicationThe paper presents a novel design of a web-based Safe City & Coastal Zone GIS (SCCZ-GIS) which integrates data acquired from different remote sensing and geospatial data sources for monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilizes several innovative technologies and directly co-operates with different remote sensing data sources and services, like a satellite ground station...
-
Support for argument structures review and assessment
PublicationArgument structures are commonly used to develop and present cases for safety, security and for other properties of systems. Such structures tend to grow excessively, which causes problems with their review and assessment. Two issues are of particular interest: (1) systematic and explicit assessment of the compelling power of an argument, and (2) communication of the result of such an assessment to relevant recipients. The paper...
-
Hedging Strategies of Derivatives Instruments for Commodity Trading Entities
PublicationHedging as an outcome of risk management arises to account several questions. Mentioned aspect of size of the hedging is one of them. Latter questioning refers to whether producer of manufacturer are willing to secure entire exposure, when the hedging should start, now or later in the future, what is the vision on market like direction of market, time of interest, magnitude of exposure, what would be the preferred instruments of...
-
A survey of neural networks usage for intrusion detection systems
PublicationIn recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...
-
E-Voting System Evaluation Based on the Council of Europe Recommendations: nVotes
PublicationE-voting implantation has been facing important challenges in recent years. Several incidents, together with a lack of evaluation methodologies social and cultural customs hinder a broader application. In this work, the authors aim to contribute to a safer introduction of e-voting tools by applying a practical evaluation framework strongly based on the security requirements issued by the Council of Europe (CoE) in 2017 to nvotes,...
-
Induced Sheath Voltages In 110 Kv Power Cables – Case Study
PublicationThe paper considers shock hazard due to induced sheath voltages in 110 kV power cables. Various configurations of the metallic sheaths bonding and earthing (single-point bonding, both-ends bonding, cross-bonding) are analysed. Taking into account shock hazard and ability of the system to power transfer an optimal configuration is proposed.
-
Enhancing Facial Palsy Treatment through Artificial Intelligence: From Diagnosis to Recovery Monitoring
PublicationThe objective of this study is to develop and assess a mobile application that leverages artificial intelligence (AI) to support the rehabilitation of individuals with facial nerve paralysis. The application features two primary functionalities: assessing the paralysis severity and facilitating the monitoring of rehabilitation exercises. The AI algorithm employed for this purpose was Google's ML Kit “face-detection”. The classification...
-
Uziemienia w zespołach elektrowni wiatrowych
PublicationW pracy jest omawiana problematyka budowy systemów uziemień na farmach elektrowni wiatrowych. Uziemienia poszczególnych elektrowni są wykorzystywane jako elementy systemu ochrony odgromowej oraz układu ochrony od porażeń otoczenia elektrowni wiatrowej. Farmy elektrowni są często umieszczane na gruntach o wysokiej rezystywności, co utrudnia realizację skutecznych systemów uziemień elektrowni. Trudność może napotykać zwłaszcza wykonanie...
-
Data from the survey on factors determining the employment of the Gdańsk University of Technology graduates’ in the opinion of entrepreneurs
Open Research DataThe dataset includes data from the survey on factors determining the employment of the Gdańsk University of Technology (GUT) graduates’ in the opinion of entrepreneurs. The survey was conducted in 2017. The research sample included 102 respondents representing various firms from Pomeranian Voivodship. The study concerned i.a. factors determining the...
-
Number of own bank branches (2017)
Open Research DataThe number of traditional bank branches is decreasing. As can be seen from the data presented in the table below, over the year (2016-2017), the network of bank branches in Poland decreased by over half a thousand (currently the total number of traditional bank branches, excluding partner branches, amounts to nearly 6 thousand). None of the 20 largest...
-
Centrifugal magnetic fluid seals
PublicationSeals perform an important and at times overlooked function in a lubricant system. They prevent or minimize the movement of the lubricant between two surfaces and also minimize the level of contamination in the system. Seals are divided into static and dynamic types. Static seals operate in systems where the mating surfaces do not move relative to each other. In contrast, dynamic seals operate under conditions where the mating surfaces...
-
I, Robot: between angel and evil
PublicationThe boosting of most digital innovations within recent technology progress by artificial intelligence (AI) constitutes a growing topic of interest. Besides its technical aspects, increasing research activity may be observed in the domain of security challenges, and therefore of responsibility related to the controlled or hypothetically uncontrolled or autonomous emergence of AI solutions. Consequently, responsibility and ethics...
-
Functional safety with cybersecurity for the control and protection systems on example of the oil port infrastructure
PublicationSafety and cybersecurity aspects consist of two different group of functional requirements for the industrial control and protection systems in the oil port installation. It is the main reason why the analyses of safety and cybersecurity shouldn’t be integrated directly. These article presented some important issues of the functional safety analysis with regard to cybersecurity aspects in the oil seaport infrastructure. The proposed...
-
Stradar - Multimedia Dispatcher and Teleinformation System for the Border Guard
PublicationSecurity of national borders requires utilization of multimedia surveillance systems automatically gathering, processing and sharing various data. The paper presents such a system developed for the Maritime Division of the Polish Border Guard within the STRADAR project. The system, apart from providing communication means, gathers data, such as map data from AIS, GPS and radar receivers, videos and photos from camera or audio from...
-
The Impact of Ergonomic Guiding Principles on the Formation of Modern Monumental Art
PublicationCommemoration of historic events is now a commonplace phenomenon both in culture and in academic research. The phenomenon is linked to an increase in the representation of the visualisation of the past in public sphere, which in turn leads to reformulation of monumental art. Modern monuments are often spatial forms consisting both of sculpture installation and bigger constructions. In case of these realisations, the designers,...
-
A model-based approach to analysis of authentication protocols.
PublicationW referacie przedstawiono zintegrowane podejście do analizy protokołów uwierzytelniania o nazwie Object-oriented Formal Authentication Protocol Security Analysis Framework (OF-APSAF). Podejście to jest zaprojektowane na bazie sprawdzonej metody formalnej CSP wraz z narzędziami ją wspierającymi: Casper oraz FDR. Jego integralną częścią jest półformalna zorientowana obiektowo technika modelowania protokołów, ich kontekstu oraz wymagań...
-
Reconfigurable Antennas for Trustable Things
PublicationIn modern applications, the Internet of Things plays a significant role in increasing the productivity, effectiveness or safety and security of people and assets. Additionally, the reliability of Internet of Things components is crucial from the application point of view, where a resilient and low-latency network is needed. This can be achieved by utilizing reconfigurable antennas to enhance the capabilities of the wireless sensor...
-
Health monitoring services based on off-the-shelf mobile devices
PublicationDevelopment of health monitoring systems usually involves usage of dedicated devices with provided guarantees in terms of their reliability. Those devices raise the cost of the whole system, because of which such platforms are limited only to specific areas and constrained number of users. Usage of off-the- shelf devices could lower the cost and bring those systems to the masses. The paper covers possible uses of common off-the-shelf...
-
A fair distribution scheme for joint fingerprinting and decryption methods= Sprawiedliwy schemat dystrybucji dla metod łącznego osadzania odcisku palca oraz deszyfracji
PublicationThe paper addresses the fairness of the security provided by digital fingerprinting methods. It was noted that the digital fingerprinting techniques are designed primarily to protect service providers against the actions of malicious users, while honest users remain vulnerable to acts of malicious providers. The paper describes the customer's rights problem and the unbinding problem, which also apply to joint fingerprinting and...
-
Integration and Visualization of the Results of Hydrodynamic Models in the Maritime Network-Centric GIS of Gulf of Gdansk
PublicationEnsuring of security in the coastal area makes on a seaside countries research in the field of infrastructure spatial information of environmental data. The paper presents the results of work on the construction of this infrastructure by integrating electronic navigational chart with ortophotomaps of coastal areas as well as numerical data from weather and hydrodynamic models. Paper focuses on a problems associated with creating...
-
Methodological issues of functional safety and reliability assessment of critical systems in industrial hazardous plants
PublicationThe aim of this article is to identify and discuss some methodological issues that are of interest among functional safety specialists and experts after publication of the second edition of international standards IEC 61508 and IEC 61511, including the design and implementing the safety-related functions of higher safety integrity levels and protection layers. The basic role of safety-related systems is to reduce effectively and...
-
Coastal zone monitoring using Sentinel-1 SAR polarymetry data
PublicationIn recent years the role of the surveillance and security of Polish boundaries has significantly increased. Polish coastal zone monitoring requires various approaches using various technological means in order to ensure the protection of Polish boundaries. In this paper, the authors discuss and present alternatives to underwater surveillance methods of coastal area analysis and monitoring using data retrieved from the newly developed...
-
ADAPTIVE PREDICTIONS OF THE EURO/ZŁOTY CURRENCY EXCHANGE RATE USING STATE SPACE WAVELET NETWORKS AND FORECAST COMBINATIONS
PublicationThe paper considers the forecasting of the euro/Polish złoty (EUR/PLN) spot exchange rate by applying state space wavelet network and econometric forecast combination models. Both prediction methods are applied to produce one-trading-day- ahead forecasts of the EUR/PLN exchange rate. The paper presents the general state space wavelet network and forecast combination models as well as their underlying principles. The state space...
-
Deep Learning: A Case Study for Image Recognition Using Transfer Learning
PublicationDeep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...
-
Deep Learning
PublicationDeep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...
-
Have you heard about ALAN? Now, there is also ROLAN!
PublicationThis article examines the new ROLAN movement and points out why this might be the next big thing for lighting professionals.
-
Techniczne aspekty implementacji nowoczesnej platformy e-learningowej
PublicationZaprezentowano aspekty techniczne implementacji nowoczesnej platformy nauczania zdalnego. Omówiono obszary funkcjonalne takie jak: system zarządzania nauczaniem, serwis informacyjny, dodatkowe oprogramowanie dydaktyczne oraz kolekcja zasobów multimedialnych. Przybliżono zagadnienia związane z bezpieczeństwem takiej platformy. Na końcu przedstawiono parametry techniczne wdrożonej na Politechnice Gdańskiej platformy eNauczanie.
-
Adaptive Method for Modeling of Temporal Dependencies between Fields of Vision in Multi-Camera Surveillance Systems
PublicationA method of modeling the time of object transition between given pairs of cameras based on the Gaussian Mixture Model (GMM) is proposed in this article. Temporal dependencies modeling is a part of object re-identification based on the multi-camera experimental framework. The previously utilized Expectation-Maximization (EM) approach, requiring setting the number of mixtures arbitrarily as an input parameter, was extended with the...
-
COLON, Ascending colon - Female, 79 - Tissue image [8200729592216271]
Open Research DataThis is the histopathological image of COLON tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
COLON, Ascending colon - Female, 79 - Tissue image [8200729592213421]
Open Research DataThis is the histopathological image of COLON tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Optimal edge-coloring with edge rate constraints
PublicationWe consider the problem of covering the edges of a graph by a sequence of matchings subject to the constraint that each edge e appears in at least a given fraction r(e) of the matchings. Although it can be determined in polynomial time whether such a sequence of matchings exists or not [Grötschel et al., Combinatorica (1981), 169–197], we show that several questions about the length of the sequence are computationally intractable....
-
Knowledge engineer – more than only technical position. The concept of knowledge engineering education at the Faculty of Management and Economics
PublicationOrganizational learning means an effective knowledge management. Management is nothing more than the constant decision-making. Therefore organizational learning must be seen through the prism of decisions taken at all levels. Unfortunately decisions are never taken within comfortable conditions. Decision maker suffers from a lack of any support. There is often a problem with human resources having right skills, sometimes they do...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublicationThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Andrzej Chybicki dr inż.
PeopleA graduate of the Faculty of Electronics, Telecommunications and Informatics at the Gdańsk University of Technology, PhD in technical sciences in the field of IT specializing in distributed data processing in IT . Aimed at exploiting the achievements and knowledge in the field of industrial research. He cooperated with a number of companies including OpeGieka Elbląg, Reson Inc., Powel Sp. z o. o., Wasat, Better Solutions, the European...
-
A comprehensive overview of software product management challenges
PublicationThe principal focus of software product management is to ensure the economic success of the product, which means to prolong the product life as much as possible with modest expenditures to maximizs profits. Software product managers play an important role in the software development organization while being responsible for the strategy, business case, product roadmap, high-level requirements, product deployment (release-management),...
-
SEM images of Ni-Mo2CTx/Mo2Ga2C before and after catalytic dry reforming of methane
Open Research DataThe dataset includes SEM images of Ni-Mo2CTx/Mo2Ga2C catalysts before and after the dry reforming of methane.
-
Bartosz Sawik
PeopleDr Bartosz Sawik is a Professor at the Department of Business Informatics and Engineering Management, AGH University of Science and Technology, Krakow, Poland and at the Institute of Smart Cities, GILT-OR Group, Department of Statistics, Computer Science and Mathematics, Public University of Navarre, Pamplona, Spain. He is a Visiting Researcher at the University of California, Berkeley, USA. He has a Ph.D. and a M.Sc. and Eng....
-
Detection of Closing Crack in Beam Based on Responses Induced by Harmonic Excitation
PublicationThe non-linear contact model was chosen to simulate the closed crack in the cantilever beam. The study examines the shape and characteristics of the phase diagram of a cantilever beam with closed cracks. It investigates how various crack properties influence the geometry of the phase diagram and proposes a method for identifying cracks based on their features. The area of each closed curve in the phase diagram is determined using...
-
Tracking body movement for radio channel measurements in BAN with indoor positioning system
PublicationThis paper presents indoor positioning system based on inertial navigation with additional distance measurements using UWB modems and map matching to increase accuracy and eliminate position drift. Such system may be used to track position of human body during radio channel measurements for body area networks. Performance of proposed system and limitations caused by inertial navigation are briefly described.
-
Report no WOiO/II/67/2015 - Expertise about load capacity of twistlock foundation and sliding foundation
PublicationCustomer delivered to Laboratory 17 elements - twist lock foundations and sliding lock foundations (ship equipment for container lashing). Elements were selected from production series. Each element was loaded for braking load. After test visual inspection had been performed. The expertise contains: description of tested elements, test assumptions, test stand, results and conclusions
-
OCHRONA PRYWATNOŚCI W SYSTEMACH MONITORINGU WIZYJNEGO, PRZEGLĄD OPRACOWANYCH ARCHITEKTUR I ALGORYTMÓW
PublicationNieustannie rozwijające się technologie informacyjne związane z inteligentnym monitoringiem wizyjnym stwarzają ryzyko niewłaściwego wykorzystywania danych osobowych. W celu zapewnienia prawidłowej ochrony materiału wizyjnego, w ramach projektów realizowanych w Katedrze Systemów Multimedialnych WETI PG, opracowany został szereg architektur i algorytmów, które ułatwiają ochronę danych wrażliwych, takich jak: wizerunki osób, numery...
-
Abuse or contamination? Ratio determination of clenbuterol enantiomers to distinguish between doping use and meat contamination
PublicationClenbuterol has been detected in urine of several athletes during routine doping control in the past years. Athletes claimed that the clenbuterol was ingested by eating contaminated meat. Providing analytical prove for this claim is difficult. clenbuterol consists of two enantiomers, R(-) and S(+)-clenbuterol. Currently available human and veterinary preparations were found to consist of a racemic mixture of both enantiomers. When...
-
Verification of the Parameterization Methods in the Context of Automatic Recognition of Sounds Related to Danger
PublicationW artykule opisano aplikację, która automatycznie wykrywa zdarzenia dźwiękowe takie jak: rozbita szyba, wystrzał, wybuch i krzyk. Opisany system składa się z bloku parametryzacji i klasyfikatora. W artykule dokonano porównania parametrów dedykowanych dla tego zastosowania oraz standardowych deskryptorów MPEG-7. Porównano też dwa klasyfikatory: Jeden oparty o Percetron (sieci neuronowe) i drugi oparty o Maszynę wektorów wspierających....
-
Software Quality, Reliability, and Security (International Conference on Quality Software [QSIC])
Conferences -
Joint Working Conference on Secure Information Networks: Communications and Multimedia Security
Conferences -
ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code
Conferences -
Validating data acquired with experimental multimodal biometric system installed in bank branches
PublicationAn experimental system was engineered and implemented in 100 copies inside a real banking environment comprising: dynamic handwritten signature verification, face recognition, bank client voice recognition and hand vein distribution verification. The main purpose of the presented research was to analyze questionnaire responses reflecting user opinions on: comfort, ergonomics, intuitiveness and other aspects of the biometric enrollment...
-
SMALL INTESTINE, Overlapping lesion of small intestine - Female, 79 - Tissue image [8200729592202181]
Open Research DataThis is the histopathological image of SMALL INTESTINE tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Study of the Effectiveness of Model Order Reduction Algorithms in the Finite Element Method Analysis of Multi-port Microwave Structures
PublicationThe purpose of this paper is to investigate the effectiveness of model order reduction algorithms in finite element method analysis of multi-port microwave structures. Consideration is given to state of the art algorithms, i.e. compact reduced-basis method (CRBM), second-order Arnoldi method for passive-order reduction (SAPOR), reduced-basis methods (RBM) and subspace-splitting moment-matching MOR (SSMM-MOR)
-
On the fast BSS transition algorithms in the IEEE 802.11r local area wireless networks
PublicationHandover performance is critical to support multimedia services that are becoming increasingly available over the wireless devices. The high transition delay can be unaccepted for such services or can be a source of disruption on the session. On the other side, IEEE 802.11 standard is being extended with new functionalities. Security and QoS features, included in recent IEEE 802.11-2007 standard, add management frames that are...