Search results for: TERRORIST ATTACK
-
Structural Transformation to Attain Responsible BIOSciences (STARBIOS2): Protocol for a Horizon 2020 Funded European Multicenter Project to Promote Responsible Research and Innovation
Publication -
Fluorescence resonance energy transfer usage to track the sequence promoter changes in CGB5 gene in ovarian cancer patients
Publication -
Projektowanie, realizacja i eksploatacja attyk budynków mieszkalnych w aspekcie usterek i uszkodzeń cieplno-wilgotnościowych
PublicationW artykule przedstawiono w sposób syntetyczny zestawienie najbardziej istotnych zasad projektowania attyk w budynkach realizowanych w technologii tradycyjnej oraz tradycyjnej udoskonalonej. Zamieszczono zestawienie najczęściej popełnianych błędów wykonawczych oraz ich wpływ na rozkład pola temperatur w węzłach stropowo-ściennych. Zaproponowano rozwiązania projektowe ograniczając występowanie useterek cieplno-wilgotnościowech w...
-
LSA Is not Dead: Improving Results of Domain-Specific Information Retrieval System Using Stack Overflow Questions Tags
PublicationThe paper presents the approach to using tags from Stack Overflow questions as a data source in the process of building domain-specific unsupervised term embeddings. Using a huge dataset of Stack Overflow posts, our solution employs the LSA algorithm to learn latent representations of information technology terms. The paper also presents the Teamy.ai system, currently developed by Scalac company, which serves as a platform that...
-
60 GHz Microstrip Van Atta Arrays for Millimeter Wave Identification and Localization
Publication -
60 GHz Microstrip Van Atta Arrays for Millimeter Wave Identification and Localization
PublicationIn this paper performance comparison of co-polarized and cross-polarized microstrip Van Atta arrays working in the 60 GHz frequency range is presented. They can be treated as simple chipless RFID tags with frequency response based identification. Tags with three different nominal resonance frequencies of 57, 62 and 67 GHz are designed by scaling optimized base model. Designed 62 GHz co-polarized and cross-polarized arrays with...
-
The AFM micrographs of pitting corrosion evolution on high-alloy steel 1.4301
Open Research DataThe dataset contains the results of topographic imaging of high-alloy stainless steel 1.4301 on which the pitting corrosion process was induced by electrochemical methods. The study of the effects of a local attack allows for conclusions about the intensity and mechanism of this type of corrosion. The file contains atomic force microscopy (AFM) data...
-
Imaging of the effects of pitting corrosion with the use of AFM
Open Research DataPitting corrosion is a local attack on a metal surface, limited to a point or small area, which appears as a hole. Pitting corrosion is one of the most harmful forms of corrosion due to the fact that it is associated with small, difficult to detect damage, that can even lead to perforation of the structure. A single pit may range in size from micrometers...
-
Testing the positioning accuracy of GNSS solutions during the tramway track mobile satellite measurements in diverse urban signal reception conditions
Publication -
Diagnostics of the tram track shape with the use of the global positioning satellite systems (GPS/Glonass) measurements with a 20 Hz frequency sampling
PublicationSatellite geodetic measurements used in the diagnosis of railway tracks require professional receivers and a very high frequency rate of data processing. It stems from a significant speed (10 km/h) kinematic measurements carried out during the passage of a measuring platform. The survey results (positions) of deformed railroad track have waveforms nature requiring additional processing methods and approximations. Due to the announcement...
-
Testing the Positioning Accuracy of GNSS Solutions during the Tramway Track Mobile Satellite Measurements in Diverse Urban Signal Reception Conditions
PublicationMobile Global Navigation Satellite System (GNSS) measurements carried out on the railway consist of using satellite navigation systems to determine the track geometry of a moving railway vehicle on a given route. Their purposes include diagnostics, stocktaking, and design work in railways. The greatest advantage of this method is the ability to perform measurements in a unified and coherent spatial reference system, which...
-
Simple Millimeter Wave Identification System Based on 60 GHz Van Atta Arrays
PublicationThe paper presents a proof-of-concept of a millimeter-wave identification system based on Van Atta array tags in the 60 GHz band. For interrogation of the tags, a vector network analyzer and a measurement transceiver were employed in alternative test configurations. The design, fabrication and measurements of co- and cross-polarized Van Atta arrays are presented in the paper. They can be treated as simple chipless RFID tags with...
-
INFLUENCE OF TACK WELDS DISTRIBUTION AND WELDING SEQUENCE ON THE ANGULAR DISTORTION OF TIG WELDED JOINT
PublicationIn this paper the influence of tack welds distribution and welding sequence on angular distortion of the Tungsten Inert Gas (TIG) welded joint was tested. Additionally, the effect of welding current on angular distortion was assessed. For research X2CrTiNb18 (AISI 441) stainless steel (2.5 mm thick) was chosen. During research specimens were prepared with different distributionsof tack...
-
Cryptographers Track at RSA Conference
Conferences -
Badania systemów powstrzymujących pojazd przed wypadnięciem z drogi - cz. I
PublicationTransportation systems are designed and used so as to effectively and safely relocate people, goods and services. Despite this there are numerous hazards that disrupt or damage these systems. Risks such as extreme weather conditions, terrorist threats, landsliders or earthquakes are difficult to predict, manage and mitigate. One of the hazards for transportation systems are accidents, and their impact on the transport functioning...
-
AeroSense Measurements: Wind Tunnel ETH Zurich
Open Research DataData from wind tunnel tests of Aerosesne measurement system installed on NACA 0012 at ETH Zurich wind tunnel.
-
Karol Grębowski dr inż.
PeopleKarol Grębowski (M.Sc.) works as an assistant at the Department of Technical Fundamentals of Architecture Design of the Faculty of Architecture at Gdansk University of Technology. His scientific research deals with dynamic phenomena occurring during the vibration of structures, bridges, and studies the design methodology of the elements forming passive protection system of the vehicles degraded by struck or explosion in the context...
-
Regulacja osi toru w warunkach pomiarów satelitarnych :(program badań) = Geometrical adjustment of the railway track in the conditions of the satellite surveying : (research program)
PublicationW pracy zwrócono uwagę na uwarunkowania związane z zastosowaniem technik pomiarów satelitarnych GPS w pomiarach inwentaryzacyjnych linii kolejowych. Wskazano na konieczność nawiązania współpracy pomiędzy specjalistami z dziedziny pomiarów satelitarnych i środowiskiem kolejowym. Może to spowodować radykalną poprawę w zakresie poziomu utrzymania kształtu geometrycznego torów, gdzie występująca obecnie sytuacja budzi poważne zastrzeżenia....
-
Mn-Co spinel coatings on Crofer 22 APU by electrophoretic deposition: Up scaling, performance in SOFC stack at 850 °C and compositional modifications
PublicationCeramic coatings for metallic interconnects play a key role in limiting corrosion and chromium evaporation in solid oxide cells. This study presents the upscaling of the electrophoretic deposition (EPD) technique to process Mn-Co spinels on real-dimension Crofer 22 APU interconnects and the test in a SOFC stack. Area specific resistance of long-term test conducted for 5000 h at 850 °C demonstrated that two-steps sintering has a...
-
Ways of performing judo throws, and their efficiency, assessed in the open weight category in All-Japan Judo Championships
PublicationThere is no indication that earlier individual attempts in this area have been carried out in Japan. Judo masters including Kano, Koizumi, Kudo, Mifune, Tomiki and others have tried to introduce additional criteria to the classification. The need for so many modifications is a result of the many sport and referee rule changes, as well as to ensure the safety of competitors and to increase the attractiveness of judo contests. Purpose...
-
Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents
PublicationElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...
-
Automatic music genre classification based on musical instrument track separation / Automatyczna klasyfikacja gatunku muzycznego wykorzystująca algorytm separacji dźwięku instrumentó muzycznych
PublicationThe aim of this article is to investigate whether separating music tracks at the pre-processing phase and extending feature vector by parameters related to the specific musical instruments that are characteristic for the given musical genre allow for efficient automatic musical genre classification in case of database containing thousands of music excerpts and a dozen of genres. Results of extensive experiments show that the approach...
-
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublicationCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...
-
Wczesne wykrywanie spoofingu GNSS typu carry-off
PublicationW referacie przedstawiono klasyfikację ataków typu spoofing ukierunkowanych na odbiorniki satelitarnych systemów nawigacyjnych GNSS. W szczególności opisano zaawansowaną formę spoofingu w wariancie tzw. carry-off, polegającym na płynnym przejęciu kontroli nad blokami śledzenia sygnałów w zakłócanym odbiorniku. Sposób realizacji takiego ataku istotnie utrudnia jego wykrycie z użyciem metod dotychczas proponowanych w literaturze....
-
Innovative mobile method to determine railway track axis position in global coordinate system using position measurements performed with GNSS and fixed base of the measuring vehicle
Publication -
Innovative mobile method to determine railway track axis position in global coordinate system using position measurements performed with GNSS and fixed base of the measuring vehicle
PublicationThe shape of the railway track axis and its position in the global coordinate system are essential when defining design parameters of the railway. Correct reconstruction of these quantities is vital for both verifying the compliance of real track parameters with the design and for diagnosing, as all track deformations can also be defined as deviations of real parameters from their design values. The measurements of quantities related...
-
Instantaneous impedance monitoring of AA 7075 aluminum alloy corrosion in borate buffer with admixed chloride ions
PublicationThe study presents a research capabilities of Dynamic Electrochemical Impedance Spectroscopy (DEIS) as a tool used for instantaneous on-line monitoring of corrosion processes on the example of AA 7075 aluminum alloy. A borate buffer with admixed chloride ions in a quantity ranging from 0.05 to 25 mM was used to represent different types of corrosion attack. The surface of samples specimens was evaluated before and after the tests...
-
Scanning electron microscopy studies of the weld decay on SS 304 of water supply pipeline
Open Research DataThis dataset contains micrographs made with scanning electron microscope (SEM) Hitachi S-3400N, of the weld decay for water supply system pipelines made of AISI 304 stainless steel. Within the dataset one can see the different corrosion mechanisms. The micrographs were made after the Strauss test (excluding pictures labeled as pits_in_HAZ, done without...
-
Pomiarowa ocena efektywności systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym
PublicationNiniejszy referat dotyczy problemu wykrywania i przeciwdziałania atakom typu spoofing w globalnych systemach nawigacji satelitarnej. Pierwsza część referatu stanowi wprowadzenie w temat spoofingu oraz przegląd sposobów jemu przeciwdziałania. Następnie, przedstawiono autorską koncepcję systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym, a także opisano implementację prototypu tego systemu. Część trzecią poświęcono...
-
Modelling of laminated glass PVB walls of buildings exposed to vehicle impact with different speeds
PublicationThis paper presents an analytical model, developed for laminated glass subjected to a low-velocity impact. It has the ability to capture glass cracks as well as large non-linear deformations. It is based mathematically on the firstorder deformation concept, which considers the effect of membrane and transverse shear as well as bending. This theory uses damage mechanics to capture the glass cracking. For this purpose, several experiments...
-
SafeCity – a GIS-based tool profiled for supporting decision making in urban development and infrastructure protection
PublicationThis paper presents a system for analysis of municipal Critical Infrastructures, which offers integrated tools for target analysis, hazard scenario simulations and spatial analysis within a remotely accessible Web-based Geographic Information System. The system has been applied to research conducted in the city of Gdansk with the aid of blast attack, chemical leakage and flood hazard scenarios, as well as a spatial density algorithm,...
-
The International Symposium on Research in Attacks, Intrusions and Defenses (International Symposium on Recent Advances in Intrusion Detection)
Conferences -
Comparison of the Ability of Neural Network Model and Humans to Detect a Cloned Voice
PublicationThe vulnerability of the speaker identity verification system to attacks using voice cloning was examined. The research project assumed creating a model for verifying the speaker’s identity based on voice biometrics and then testing its resistance to potential attacks using voice cloning. The Deep Speaker Neural Speaker Embedding System was trained, and the Real-Time Voice Cloning system was employed based on the SV2TTS, Tacotron,...
-
Experiment with small objects floating under water in the harbor security aspect.
PublicationObservation of the underwater area is the element of general trend which primary purpose is to protect and enhance the safety of the selected region. The aim of the paper is to present the acoustic characteristics of typical objects floating on the surface or under the water, which constitute some knowledge on how to detect these objects. Create a catalog of acoustic signatures and acoustic images of objects mostly floating under...
-
Signatures and acoustic images of objects moving in water
PublicationObservation of underwater space is part of a generaltrend, which primary purpose is to protect and increasesafety in the selected area. The basic aim of the paper ispresentation of designated acoustic characteristics typicalfor objects moving on the water surface and under water,which represent some knowledge about detection of theseobjects. Create a catalog of acoustic signature and not onlyacoustic, as well as acoustic images...
-
Collective angst and collective action for progressive city policies: study1
Open Research DataPaweł Adamowicz, the liberal mayor of Gdańsk, died on January 14, 2019, after being stabbed by a man who rushed onstage during a charity event. Three studies were carried out to analyze the predictors of willingness to engage in collective action for the support of the progressive city policies he initiated. In this study 1 (N = 214), the questionnaire,...
-
Images of topography and mechanical properties (phase imaging) of cast iron samples from water installations
Open Research DataMeasurements in contact and semi-contact mode. NTEGRA Prima (NT-MDT) device. CSG 10.
-
Fuel cell noise data
Open Research DataMeasurement data of Hydrogen PEM fuel cels. The voltage fluctuations were measured over single cels of stack of 10 cels.
-
Testing Watermark Robustness against Application of Audio Restoration Algorithms
PublicationThe purpose of this study was to test to what extent watermarks embedded in distorted audio signals are immune to audio restoration algorithm performing. Several restoration routines such as noise reduction, spectrum expansion, clipping or clicks reduction were applied in the online website system. The online service was extended with some copyright protection mechanisms proposed by the authors. They contain low-level music features...
-
Analiza Globalnego Indeksu Terroryzmu Państw Europejskich
PublicationW referacie przytoczono doniesienia raportu Global Terrorism Index 2016 [1] w odniesieniu do sytuacji państw Europejskich. Raport ten publikowany jest co roku przez Instytut Ekonomii i Pokoju (ang. Institute for Economics and Peace). W raporcie tym realizowana jest analiza światowych tendencji i modeli związanych z terroryzmem. Niestety, doniesienia raportu opublikowanego na początku bieżącego roku są zatrważające, zwłaszcza w...
-
Path dependence, modularity and the offshoring of (some) physician services
PublicationThis paper integrates ideas from modularity and path dependency to explain the potential for and limitations of the offshoring of high value added physician services. While not all medical services are amenable to offshoring, a growing number of physician activities can be viewed as modular components which, at least technically, could be performed remotely. As a result, the presumption that concerns for efficiency dictate how...
-
Selective jamming of OFDM transmission in NB-IoT radio interface
PublicationThe paper presents the concept of smart jamming, which involves selective interference aimed at critical components of the OFDM signal. Research verifying the feasibility of this type of electronic attack are described. A realized testbed for jamming real NB-IoT signals in a downlink is presented. The test results demonstrate the feasibility of realizing selective jamming and its greater effectiveness compared to barrage interference.
-
Automatic Watercraft Recognition and Identification on Water Areas Covered by Video Monitoring as Extension for Sea and River Traffic Supervision Systems
PublicationThe article presents the watercraft recognition and identification system as an extension for the presently used visual water area monitoring systems, such as VTS (Vessel Traffic Service) or RIS (River Information Service). The watercraft identification systems (AIS - Automatic Identification Systems) which are presently used in both sea and inland navigation require purchase and installation of relatively expensive transceivers...
-
MAlSim - Mobile Agent Malware Simulator
PublicationOne of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...
-
Portable Raman spectrometer - design rules and applications
PublicationRaman spectroscopy has become more popular due to its new prospective field applications in forensic sciences, war against terrorism, environment protection and other field chemical analysis. Raman spectrometers can be miniaturised to portable devices and their price is decreasing due to development of optoelectronics components. Unfortunately, this technology has still numerous limitations that influence their design and limit...
-
Comparative Analysis of Two Polish Hyperbolic Systems AEGIR and JEMIOLUSZKA
PublicationGlobal Navigation Satellite System (GNSS) is seen by terrorists or hostile countries as a high value target. Volpe Center report contains the following statement: “During the course of its development for military use and more recent extension to many civilian uses, vulnerabilities of Global Navigation Satellite Systems (GNSS) – in the United States the Global Positioning System (GPS) – have become apparent. The vulnerabilities...
-
Software Agents for Computer Network Security
PublicationThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
Possible uses of crisis situation aiding system in virtual world simulation
PublicationMany of the real world crisis situations like spreading fire, hostile units attack, flood, and etc. are commonly used in computer games where a simulation of extensive virtual world is crucial. This paper presents some ideas for possible uses of existing crisis situation aiding system in such environments. Moreover it shows how this kind of system can be taught during subsequent games with a large number of players.
-
Improvement of Fingerprinting Method based on Hill Cipher by using Frequency Domain
PublicationThe main goal of this paper is to present the advantages of a digital fingerprinting in a frequency domain over a pixel domain, in case of VoD services (Video on Demand). The paper presents basic issues of a multimedia data protection by digital fingerprinting. It also describes threats to embedded fingerprints from both collusion attacks and from a transmission itself. Possible solution was presented on the example of the DCT...
-
Geographic information system for remote integration of diverse under-water acoustic sensor data
PublicationMaritime and port areas throughout the world are exposed to many different hazards, like pollution, terrorism and natural disasters. Early detection, identification and preparation of appropriateesponse strategies is especially important in the case of semi-enclosed basins like the Baltic Sea, mainly due to the marine ecosystems' continuous absorption of pollutants including oil, heavy metals and chemicals. Many of those agents...