Search results for: INTERGRANULAR ATTACK
-
Testing the Positioning Accuracy of GNSS Solutions during the Tramway Track Mobile Satellite Measurements in Diverse Urban Signal Reception Conditions
PublicationMobile Global Navigation Satellite System (GNSS) measurements carried out on the railway consist of using satellite navigation systems to determine the track geometry of a moving railway vehicle on a given route. Their purposes include diagnostics, stocktaking, and design work in railways. The greatest advantage of this method is the ability to perform measurements in a unified and coherent spatial reference system, which...
-
Simple Millimeter Wave Identification System Based on 60 GHz Van Atta Arrays
PublicationThe paper presents a proof-of-concept of a millimeter-wave identification system based on Van Atta array tags in the 60 GHz band. For interrogation of the tags, a vector network analyzer and a measurement transceiver were employed in alternative test configurations. The design, fabrication and measurements of co- and cross-polarized Van Atta arrays are presented in the paper. They can be treated as simple chipless RFID tags with...
-
INFLUENCE OF TACK WELDS DISTRIBUTION AND WELDING SEQUENCE ON THE ANGULAR DISTORTION OF TIG WELDED JOINT
PublicationIn this paper the influence of tack welds distribution and welding sequence on angular distortion of the Tungsten Inert Gas (TIG) welded joint was tested. Additionally, the effect of welding current on angular distortion was assessed. For research X2CrTiNb18 (AISI 441) stainless steel (2.5 mm thick) was chosen. During research specimens were prepared with different distributionsof tack...
-
Imaging of the effects of pitting corrosion with the use of AFM
Open Research DataPitting corrosion is a local attack on a metal surface, limited to a point or small area, which appears as a hole. Pitting corrosion is one of the most harmful forms of corrosion due to the fact that it is associated with small, difficult to detect damage, that can even lead to perforation of the structure. A single pit may range in size from micrometers...
-
Cryptographers Track at RSA Conference
Conferences -
AeroSense Measurements: Wind Tunnel ETH Zurich
Open Research DataData from wind tunnel tests of Aerosesne measurement system installed on NACA 0012 at ETH Zurich wind tunnel.
-
The SEM micrographs of the cavitation erosion-corrosion process of selected copper alloys degradation
Open Research DataThe dataset contains Scanning Electron Micrographs of CuZn40Mn3Fe brass compared with Superston and Novoston bronze after cavitation erosion-corrosion exposure using a vibratory transducer (in accordance with ASTM G32). The micrographs compare the topography of samples subjected cavitation erosion in 3% NaCl at room temperature, leading to the surface...
-
Regulacja osi toru w warunkach pomiarów satelitarnych :(program badań) = Geometrical adjustment of the railway track in the conditions of the satellite surveying : (research program)
PublicationW pracy zwrócono uwagę na uwarunkowania związane z zastosowaniem technik pomiarów satelitarnych GPS w pomiarach inwentaryzacyjnych linii kolejowych. Wskazano na konieczność nawiązania współpracy pomiędzy specjalistami z dziedziny pomiarów satelitarnych i środowiskiem kolejowym. Może to spowodować radykalną poprawę w zakresie poziomu utrzymania kształtu geometrycznego torów, gdzie występująca obecnie sytuacja budzi poważne zastrzeżenia....
-
Mn-Co spinel coatings on Crofer 22 APU by electrophoretic deposition: Up scaling, performance in SOFC stack at 850 °C and compositional modifications
PublicationCeramic coatings for metallic interconnects play a key role in limiting corrosion and chromium evaporation in solid oxide cells. This study presents the upscaling of the electrophoretic deposition (EPD) technique to process Mn-Co spinels on real-dimension Crofer 22 APU interconnects and the test in a SOFC stack. Area specific resistance of long-term test conducted for 5000 h at 850 °C demonstrated that two-steps sintering has a...
-
Ways of performing judo throws, and their efficiency, assessed in the open weight category in All-Japan Judo Championships
PublicationThere is no indication that earlier individual attempts in this area have been carried out in Japan. Judo masters including Kano, Koizumi, Kudo, Mifune, Tomiki and others have tried to introduce additional criteria to the classification. The need for so many modifications is a result of the many sport and referee rule changes, as well as to ensure the safety of competitors and to increase the attractiveness of judo contests. Purpose...
-
Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents
PublicationElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...
-
Automatic music genre classification based on musical instrument track separation / Automatyczna klasyfikacja gatunku muzycznego wykorzystująca algorytm separacji dźwięku instrumentó muzycznych
PublicationThe aim of this article is to investigate whether separating music tracks at the pre-processing phase and extending feature vector by parameters related to the specific musical instruments that are characteristic for the given musical genre allow for efficient automatic musical genre classification in case of database containing thousands of music excerpts and a dozen of genres. Results of extensive experiments show that the approach...
-
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublicationCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...
-
Failure of austenitic stainless steel tubes during steam generator operation
PublicationThe article presents the failure process of austenitic stainless steels used in power devices, such as heat exchangers, steam generators, in terms of local corrosion: pitting, stress and intergranular corrosion, paying particular attention to welded joints area. The effect of steel chemical composition, microstructure, welding process and work environment was analyzed. The second part of the article presents the results of the...
-
The exemplary Kelvin probe microscopy studies of sensitized austenitic stainless steels
Open Research DataThe dataset summarizes the results of imaging the surface potential distribution using the Kelvin probe scanning technique. Due to the fact that the potential measured in this way is proportional to the electrochemical potential of metals or intermetallic phases, it is possible to assess the nobility differences of various alloy components. In the case...
-
Wczesne wykrywanie spoofingu GNSS typu carry-off
PublicationW referacie przedstawiono klasyfikację ataków typu spoofing ukierunkowanych na odbiorniki satelitarnych systemów nawigacyjnych GNSS. W szczególności opisano zaawansowaną formę spoofingu w wariancie tzw. carry-off, polegającym na płynnym przejęciu kontroli nad blokami śledzenia sygnałów w zakłócanym odbiorniku. Sposób realizacji takiego ataku istotnie utrudnia jego wykrycie z użyciem metod dotychczas proponowanych w literaturze....
-
Innovative mobile method to determine railway track axis position in global coordinate system using position measurements performed with GNSS and fixed base of the measuring vehicle
Publication -
Innovative mobile method to determine railway track axis position in global coordinate system using position measurements performed with GNSS and fixed base of the measuring vehicle
PublicationThe shape of the railway track axis and its position in the global coordinate system are essential when defining design parameters of the railway. Correct reconstruction of these quantities is vital for both verifying the compliance of real track parameters with the design and for diagnosing, as all track deformations can also be defined as deviations of real parameters from their design values. The measurements of quantities related...
-
Instantaneous impedance monitoring of AA 7075 aluminum alloy corrosion in borate buffer with admixed chloride ions
PublicationThe study presents a research capabilities of Dynamic Electrochemical Impedance Spectroscopy (DEIS) as a tool used for instantaneous on-line monitoring of corrosion processes on the example of AA 7075 aluminum alloy. A borate buffer with admixed chloride ions in a quantity ranging from 0.05 to 25 mM was used to represent different types of corrosion attack. The surface of samples specimens was evaluated before and after the tests...
-
Pomiarowa ocena efektywności systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym
PublicationNiniejszy referat dotyczy problemu wykrywania i przeciwdziałania atakom typu spoofing w globalnych systemach nawigacji satelitarnej. Pierwsza część referatu stanowi wprowadzenie w temat spoofingu oraz przegląd sposobów jemu przeciwdziałania. Następnie, przedstawiono autorską koncepcję systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym, a także opisano implementację prototypu tego systemu. Część trzecią poświęcono...
-
SafeCity – a GIS-based tool profiled for supporting decision making in urban development and infrastructure protection
PublicationThis paper presents a system for analysis of municipal Critical Infrastructures, which offers integrated tools for target analysis, hazard scenario simulations and spatial analysis within a remotely accessible Web-based Geographic Information System. The system has been applied to research conducted in the city of Gdansk with the aid of blast attack, chemical leakage and flood hazard scenarios, as well as a spatial density algorithm,...
-
Localized impedance measurements of AA2024 and AA2024-T3 performed by means of AFM in contact mode
PublicationPurpose: The purpose of this paper is to present the results of an atomic force microscopy (AFM) based approach to local impedance spectroscopy (LIS) measurement performed on AA2024 and AA2024-T3 aluminium alloys. Design/methodology/approach: AFM-LIS measurements were performed ex-situ without the electrolyte environment, so in fact the electrical not electrochemical impedance was obtained. Findings: Relative local impedance values...
-
The International Symposium on Research in Attacks, Intrusions and Defenses (International Symposium on Recent Advances in Intrusion Detection)
Conferences -
Comparison of the Ability of Neural Network Model and Humans to Detect a Cloned Voice
PublicationThe vulnerability of the speaker identity verification system to attacks using voice cloning was examined. The research project assumed creating a model for verifying the speaker’s identity based on voice biometrics and then testing its resistance to potential attacks using voice cloning. The Deep Speaker Neural Speaker Embedding System was trained, and the Real-Time Voice Cloning system was employed based on the SV2TTS, Tacotron,...
-
Three-dimensional CFD modeling of a steam ejector
Publication -
Collective angst and collective action for progressive city policies: study1
Open Research DataPaweł Adamowicz, the liberal mayor of Gdańsk, died on January 14, 2019, after being stabbed by a man who rushed onstage during a charity event. Three studies were carried out to analyze the predictors of willingness to engage in collective action for the support of the progressive city policies he initiated. In this study 1 (N = 214), the questionnaire,...
-
Images of topography and mechanical properties (phase imaging) of cast iron samples from water installations
Open Research DataMeasurements in contact and semi-contact mode. NTEGRA Prima (NT-MDT) device. CSG 10.
-
Testing Watermark Robustness against Application of Audio Restoration Algorithms
PublicationThe purpose of this study was to test to what extent watermarks embedded in distorted audio signals are immune to audio restoration algorithm performing. Several restoration routines such as noise reduction, spectrum expansion, clipping or clicks reduction were applied in the online website system. The online service was extended with some copyright protection mechanisms proposed by the authors. They contain low-level music features...
-
Fuel cell noise data
Open Research DataMeasurement data of Hydrogen PEM fuel cels. The voltage fluctuations were measured over single cels of stack of 10 cels.
-
Austenitic stainless steel sensitization
Open Research DataHigh-alloy steels, thanks to their composition and content of appropriate alloying additives, are characterized by increased resistance to many corrosive environments. However, this is due to the increased sensitivity of the described construction materials to specific environmental conditions during their use. An example may be the increased susceptibility...
-
Selective jamming of OFDM transmission in NB-IoT radio interface
PublicationThe paper presents the concept of smart jamming, which involves selective interference aimed at critical components of the OFDM signal. Research verifying the feasibility of this type of electronic attack are described. A realized testbed for jamming real NB-IoT signals in a downlink is presented. The test results demonstrate the feasibility of realizing selective jamming and its greater effectiveness compared to barrage interference.
-
Path dependence, modularity and the offshoring of (some) physician services
PublicationThis paper integrates ideas from modularity and path dependency to explain the potential for and limitations of the offshoring of high value added physician services. While not all medical services are amenable to offshoring, a growing number of physician activities can be viewed as modular components which, at least technically, could be performed remotely. As a result, the presumption that concerns for efficiency dictate how...
-
Imaging of morphological and physicochemical changes occuring in the structure of austenitic steel due to the thermal sensitization
Open Research DataIn polycrystalline materials, grain boundaries are always where phenomena such as surface diffusion, sedimentation and corrosion occur. They have a significant impact on the macroscopic properties of the construction material [1]. In addition to inhomogeneities such as manganese sulphide inclusions formed during the metallurgical process, interfacial...
-
MAlSim - Mobile Agent Malware Simulator
PublicationOne of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...
-
Narracje o świeżej traumie. Upamiętnianie ataków terrorystycznych w krajobrazie codziennym miast
PublicationRecent trauma Narratives: commemorating terrorist attacks in Everyday cityscape Contemporary city incidentally becomes a non-accidental target of acts violating the primary sense of security and safety. The fundamental assumptions about so- cial and interpersonal interactions that guarantee social life are severely disturbed. These events, primarily the ones related to terrorist attacks, leave in social memo- ry traces associated...
-
Software Agents for Computer Network Security
PublicationThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
Possible uses of crisis situation aiding system in virtual world simulation
PublicationMany of the real world crisis situations like spreading fire, hostile units attack, flood, and etc. are commonly used in computer games where a simulation of extensive virtual world is crucial. This paper presents some ideas for possible uses of existing crisis situation aiding system in such environments. Moreover it shows how this kind of system can be taught during subsequent games with a large number of players.
-
Improvement of Fingerprinting Method based on Hill Cipher by using Frequency Domain
PublicationThe main goal of this paper is to present the advantages of a digital fingerprinting in a frequency domain over a pixel domain, in case of VoD services (Video on Demand). The paper presents basic issues of a multimedia data protection by digital fingerprinting. It also describes threats to embedded fingerprints from both collusion attacks and from a transmission itself. Possible solution was presented on the example of the DCT...
-
Analysis of impact of lossy audio compression on the robustness of watermark embedded in the DWT domain for non-blind copyright protection
PublicationA methodology of non-blind watermarking of the audio content is proposed. The outline of audio copyright problem and motivation for practical applications are discussed. The algorithmic theory pertaining watermarking techniques is briefly introduced. The system architecture together with employed workflows for embedding and extracting the watermarks are described. The implemented approach is described and obtained results are reported....
-
Ring Opening of Triflates Derived from Benzophospholan-3-one Oxides by Aryl Grignard Reagents as a Route to 2‑Ethynylphenyl(diaryl)phosphine Oxides
PublicationA new simple method for the synthesis of 2-ethynylphenyl(diaryl)phosphine oxides via ring opening of benzophosphol-3-yl triflates has been developed. This process occurs via nucleophilic attack of a Grignard reagent at the phosphorus center, which results in ring opening and cleavage of a leaving group. The reaction proceeds under mild conditions and, within 15−60 min, leads to a library of previously unavailable 2-ethynylphenylphosphine...
-
Measurement of the tram rail profile during a year of operation - supplementary data
Open Research DataThe aim of the work was to analyze the wear of rails during operation and to analyze the supplementation of heavy metals in the soil around the tram route, originating from wearing out rails and tram wheels.The dataset contains measurements of rail head coordinates in 9 research sections made in 8 measurement series. The wear of the rails in selected...
-
Mechanical and Microstructural Characterization of TIG Welded Dissimilar Joints between 304L Austenitic Stainless Steel and Incoloy 800HT Nickel Alloy
PublicationIn this article, the mechanical properties and microstructure of 304L austenitic stainless steel/Incoloy 800HT nickel alloy dissimilar welded joints are investigated. The joints were made of 21.3 mm × 7.47 mm tubes using the TIG process with the use of S Ni 6082 nickel filler metal. No welding imperfections were found and high strength properties of joints were obtained, meeting the assumed acceptance criteria of the product’s...
-
Determination of causes of accelerated local corrosion of austenitic steels in water supply systems
PublicationThis paper concerns an inspection of a water supply system, made of AISI 304 steel, which showed signs of local corrosion at the weld. Such corrosion caused material perforation after very short periods of operation. It was revealed that steel was sensitised during the welding process. It was also proven that chromium micro-segregation occurred in the alloy leading to galvanic cell formation which initialised the process of pitting...
-
Rafał Leszczyna dr hab. inż.
PeopleDr hab. Rafal Leszczyna is an associate professor at Gdansk University of Technology, Faculty of Management and Economics. He holds the M.Sc. degrees of Computer Science and Business Management. In December, 2006 he earned a Ph.D. in Computer Science, specialisation - Computer Security at the Faculty of Electronics, Telecommunications and Informatics of Gdansk University of Technology. Between 2004 and 2008 he worked in the European...
-
Microscopic examination of the texture of paper products
Open Research DataAtomic force microscopy (AFM) can be used to study the state of the paper fibers with the aim of providing qualitative and semi-quantitative information on degradation and aging. The work [1] reports the results of tests of various paper products subjected to deliberate aging processes under the influence of various factors. Chemical and biological...
-
Possible uses of crisis situation aiding system in virtual world simulation
PublicationMany of the real world crisis situations like spreading fire, hostile units attack, flood, and etc. are commonly used in computer games where a simulation of extensive virtual world is crucial. This paper presents some ideas for possible uses of existing crisis situation aiding system in such environments. Moreover, it shows how this kind of system can be taught during subsequent games with a large number of players. As an example...
-
Mesh dependence study for numerical assessment of hydrodynamic characteristics of windsurfing fin
PublicationThe presented research aims to assess the drag coefficient and lift coefficient versus angle of attack curves for windsurfing fin. Special attention in the research was being paid to the evaluation of the stall angle value. The angle of incidence for which the stall occurs was searched, and the sensitivity of the solution for the mesh resolution was studied. The mesh resolution sensitivity analysis was done by systematically decreasing...
-
Biometric identity verification
PublicationThis chapter discusses methods which are capable of protecting automatic speaker verification systems (ASV) from playback attacks. Additionally, it presents a new approach, which uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. We show that in this case training the system with large amounts of spectrogram patches may be difficult, and...
-
The Novel Findings About the Hussite’s Warfares in the Gdansk/Danzig Surrounding in the Late Summer of 1433
PublicationOne of the most spectacular episodes during the Hussite Wars was the Czech raid through the lands of the Teutonic Order up to the Baltic Sea in 1433. Although historians and then-witnesses focused on the sacked Cistercian Abbey in Oliva and soldiers filling the bottles with seawater, the scale of damages in the main harbour of Prussia and its surroundings has not been the subject of research yet. Furthermore, most scholars treatthe...
-
CFD modeling of a diesel evaporator used in fuel cell systems
Publication