Search results for: INTERGRANULAR ATTACK - Bridge of Knowledge

Search

Search results for: INTERGRANULAR ATTACK

Search results for: INTERGRANULAR ATTACK

  • Reliability data safety instrumented systems SIS from the functional safety analysis example critical instalation

    Open Research Data

    The dataset represents the results of an example of functional safety analysis systems is presented below. It is based on a control system, which consists of some basic components like sensors, programmable logic controllers and valves. It is a part of petrochemical critical installations. The communication between sensor logic controllers and actuators...

  • Influence of permanent magnetic field on wear performance of dry sliding contacts

    Publication

    - WEAR - Year 2011

    Results of experimental studies concerning the influence of permanent magnetic field on wear of dry sliding contact are presented.It was found that magnetic field of horizontal orientation is causing temporary reduction of material's hardness. It also facilitates and accelerates removal process of wear particles from the contact zone.Formation of bulges, consisting of accumulated and compacted anti-ferromagnetic material produced...

    Full text to download in external service

  • Technical diagnostics and monitoring of traction current collectors

    Publication

    - Year 2009

    New evaluation methods of the technical condition of rolling stock current collectors are proposed in this paper. The method of automatic measurement of the pantograph static force characteristic, realized when the vehicle runs through the test section of the track with especially prepared overhead line height distribution, has been practically implemented by the Polish Railways. The method of testing the slipper spring suspension...

  • Efekty egoistycznych ataków na poziomie mac w sieciach ad hoc o topologii wieloskokowej

    Stacje sieci ad hoc mogą manipulować parametrami dostępu do medium transmisyjnego dla osiągnięcia nienależnie wysokiej jakości usług. Dla środowiska sieci ad hoc o topologii wieloskokowej rozważane są ataki na mechanizmy odłożenia transmisji i klasyfikacji ruchu, przeprowadzane zarówno w stosunku do przepływów źródłowych jak i tranzytowych. Wyniki pozwalają wstępnie ocenić efekty takich ataków oraz skuteczność mechanizmów obronnych.

  • Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment

    Publication

    - Year 2015

    The smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...

    Full text to download in external service

  • The effect of pre-hydrogen charging on corrosion behaviour of superduplex stainless steel welded joints

    Publication

    The paper presents results of research undertaken to determine the influence of hydrogen on passivity and corrosion resistance of 2507 super duplex stainless steel welded joints. Butt welded joints were made with low heat input using flux corded arc welding (FCAW) method. Coupons of 5.0 x 5.0 mm were cut from the welded joints containing weld metal (WM), heat affected zone (HAZ) and parent metal (PM). Hydrogen was introduced...

  • EE-ISAC—Practical Cybersecurity Solution for the Energy Sector

    Publication

    - ENERGIES - Year 2022

    A recent survey of cybersecurity assessment methods proposed by the scientific community revealed that their practical adoption constitutes a great challenge. Further research that aimed at identifying the reasons for that situation demonstrated that several factors influence the applicability, including the documentation level of detail, the availability of supporting tools, and the continuity of support. This paper presents the...

    Full text available to download

  • Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks

    Publication

    - CMC-Computers Materials & Continua - Year 2020

    The increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated...

    Full text available to download

  • Opinia techniczna rozjazdu zwyczajnego Rz 49E1-190-1:9 z szynami ochronnymi

    Publication

    - Year 2011

    Opinia techniczna rozjazdu zwyczajnego Rz 49E1-190-1:9 z szynami ochronnymi dla firmy TRACK TEC KOLTRAM

  • Tonality Estimation and Frequency Tracking of Modulated Tonal Components

    A novel method for tonality estimation and frequency tracking of tonal components modulated in frequency and amplitude is presented. The algorithm detects the local maxima of magnitude spectra corresponding to three contiguous frames of a signal and matches them into the tonal track candidates. The magnitude-based and phase-based methods are used to estimate the frequency jumps between spectrum maxima belonging to the tonal track...

    Full text to download in external service

  • Stanisław Barański

    People

    Stanisław Barański received BSc in 2019 and MSc in 2020 in informatics at Gdańsk University of Technology. Currently, he is a PhD candidate at the Department of Computer Architecture, Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. His research interests include blockchains and cryptography, especially the issue of blockchain-based internet voting and mitigation of content poisoning...

  • Research project BRIK: development of an innovative method for determining the precise trajectory of a railway vehicle

    Publication

    - Przegląd Komunikacyjny - Year 2019

    In the paper the essential assumptions regarding a research project implemented by a consortium of Gdansk University of Technology and Gdynia Maritime University are presented. The project has been commissioned by National Center of Research and Development with cooperation with Polish Railways (PKP Polskie Linie Kolejowe S.A.). The project is focused in implementation of modern measurement techniques using Global Navigation Positioning...

    Full text available to download

  • Selektywne zakłócanie transmisji OFDM w interfejsie radiowym NB-IoT

    W artykule przedstawiono zagadnienie tzw. inteligentnego zagłuszania, polegającego na selektywnym zakłócaniu krytycznych składowych sygnału OFDM. Opisane zostały badania weryfikujące możliwość przeprowadzenia tego rodzaju ataku elektronicznego. Przedstawiono zrealizowane stanowisko badawcze, umożliwiające zakłócanie rzeczywistych sygnałów NB-IoT w łączu w dół. Wyniki badań wykazują możliwość realizacji selektywnego zagłuszania...

    Full text to download in external service

  • Implementation of DEIS for reliable fault monitoring and detection in PEMFC single cells and stacks

    Publication

    Dynamic Electrochemical Impedance Spectroscopy (DEIS) was presented as novel method for diagnostic and monitoring of PEMFC stack and single cells operation. Impedance characteristics were obtained simultaneously with current - voltage characteristics for stack and each individual cell. Impedance measurements were performed in galvanodynamic mode. It allowed to compare performance of each cell and identification of faulty cell operation...

    Full text available to download

  • Correction of determined coordinates of railway tracks in mobile satellite measurements

    Publication

    - Diagnostyka - Year 2020

    This article examines one of the basic issues related to the technique of mobile satellite measurements in railway tracks. This problem concerns the correction of the determined coordinates of the track centerline. The need to perform this operation results from the GNSS receivers positioning at a certain height above the level of the existing track axis, leading to longitudinal and lateral shifts of antennas. The key problem here...

    Full text available to download

  • Electron attachment to hexafluoropropylene oxide (HFPO)

    Publication
    • M. Zawadzki
    • A. Chachereau
    • J. Kočišek
    • C. Franck
    • J. Fedor

    - JOURNAL OF CHEMICAL PHYSICS - Year 2018

    We probe the electron attachment in hexafluoropropylene oxide (HFPO), C3F6O, a gas widely used in plasma technologies. We determine the absolute electron attachment cross section using two completely different experimental approaches: (i) a crossed-beam experiment at single collision conditions (local pressures of 5 × 10−4 mbar) and (ii) a pulsed Townsend experiment at pressures of 20–100 mbar. In the latter method, the cross sections...

    Full text available to download

  • Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures

    Publication

    - Year 2013

    In the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...

    Full text to download in external service

  • UG students’ perception of city’s corporation activities aimed at encouraging young educated to study and settle in Gdansk in Poland.

    Open Research Data

    Nowadays, the urban areas very often attract the poor and the unemployed, leading to the creation of neighbourhoods of poverty (slums) and other economic and social problems. All over the World cities include sustainable goals in their development strategies but the question is, whether the city development strategies foresee activities devoted also...

  • How to fund an additional secular function in the monumental church?

    Publication

    - Year 2018

    The implementation of a new public function into the non-used church spaces like attics or cellars in context of revitalizing a lawfully protected historical city areas have diversified aspects. The article describes the financial aspect of adaptation of omitted spaces of monumental sacral buildings by presenting funding possibilities in the European Union countries available in period of 2017-2018 and the funds planned for the...

    Full text to download in external service

  • Power equalization of AES FPGA implementation

    This paper briefly introduces side channel attacks on cryptographic hardware with special emphasis on differential power analysis(DPA). Based on existing countermeasures against DPA, design method combining power equalization for synchronous and combinatorialcircuits has been proposed. AES algorithm has been implemented in Xilinx Spartan II-E field programmable gate array (FPGA) deviceusing the standard and power-equalized methods....

    Full text available to download

  • An innovative approach to the forecasting of energetic effects while wood sawing

    Publication

    - Year 2013

    In the classical approach, energetic effects (cutting forces and cutting power) of wood sawing process are generally calculated on the basis of the specific cutting resistance, which is in the case of wood cutting the function of more or less important factors. On the other hand, the cutting forces (power) problem may be tackled with an innovative, up-to-date fundamental analysis of the mechanics of sawing based on modern fracture...

  • An Innovative Approach to the Forecasting of Energetic Effects While Wood Sawing

    Publication

    - Drvna Industrija - Year 2014

    In the classical approach, energetic effects (cutting forces and cutting power) of wood sawing process are generally calculated on the basis of the specifi c cutting resistance, which is in the case of wood cutting the function of more or less important factors. On the other hand, the cutting forces (power) problem may be tackled with an innovative, up-to-date fundamental analysis of the mechanics of sawing based on modern fracture mechanics....

    Full text available to download

  • Detection and Model of Thermal Traces Left after Aggressive Behavior of Laboratory Rodents

    Automation of complex social behavior analysis of experimental animals would allow for faster, more accurate and reliable research results in many biological, pharmacological, and medical fields. However, there are behaviors that are not only difficult to detect for the computer, but also for the human observer. Here, we present an analysis of the method for identifying aggressive behavior in thermal images by detecting traces...

    Full text available to download

  • Idea zrównoważonego rozwoju

    Publication

    Zrównoważony rozwój to termin bardzo popularny, w ostatnich latach pojawiający się nie tylko w aktach prawnych, statutach i dokumentach strategicznych, lecz także w publikacjach naukowych czy wnioskach grantowych. Dla wielu osób mimo jasności koncepcji i rozumienia przekazu termin ten jest niejednoznaczny i pozwala na dowolną interpretację.

  • Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management

    Publication

    - ENERGIES - Year 2022

    This article outlines an integrated functional safety and cybersecurity evaluation approach within a framework for business continuity management (BCM) in energy companies, including those using Industry 4.0 business and technical solutions. In such companies, information and communication technology (ICT), and industrial automation and control system (IACS) play important roles. Using advanced technologies in modern manufacturing...

    Full text available to download

  • Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia

    Publication

    This paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). The solution proposed here is a new joint fingerprinting and decryption method which meets the requirements for both imperceptibility and robustness of fingerprints and scalability in terms of design and distribution of fingerprinted multimedia content. The proposed method uses a simple block cipher based on matrix...

    Full text to download in external service

  • Educational and cognitive aspects of adaptation of nonuse spaces in monumental sacral objects.

    Publication

    - Year 2018

    The area of attics and towers in historic churches in Europe are yet quite inaccessible places for visitors, shrouded in the atmosphere of mysticism, hiding many secrets. Introduction of the new public function into the non-used zones of the monumental sacral objects has many aspects including educational and cognitive ones which are discussed in the following article. The article indicates items that can be found in the zone above...

    Full text to download in external service

  • Earthworks calculations due to reconstruction of railway geometrical layout

    Publication

    - Year 2014

    The paper characterizes continuation of ongoing work of computer program MUGO which is connected with earthworks. The program is related to the modernization of the railway track layout. The methodology for the calculating the size of earthworks in the areas of embankments on the two way railway line is discussed in detail.

  • Experimental investigation of the PEM fuel cells performance for automotive and stationary applications

    Publication

    The aim of the study was to provide dynamic characteristics of the PEM fuel cell system consisted of Nexa modules, provide steady-state characteristics of the for different values of air excess ratio and steady-state characteristics for different stack temperatures and given load.

  • Natural ventilation performance of family building in cold climate during windless time

    In this paper, the field measurements results are presented on the stack ventilation effect. The paper presents the results of performance (air change rate ACH) natural ventilation for building with inlet gap measured for the transitional season (between heating and summer season). The measurements were performed during a windless time. The house was located in northern Poland, in a cold climate region. The measurement system...

    Full text available to download

  • Accuracy assessment of mobile satellite measurements in relation to the geometrical layout of rail tracks

    The paper presents the campaigns of mobile satellite measurements, carried out in 2009–2015 on the railway and tram lines. The accuracy of the measurement method has been analysed on the basis of the results obtained in both horizontal and vertical planes. The track axis deviation from the defined geometric shape has been analysed in the areas clearly defined in terms of geometry, i.e. on the straight sections and sections with...

    Full text available to download

  • Influence of compaction effectiveness on interlayer bonding of asphalt layers

    Publication

    - Year 2014

    The paper presents the results of research on the interlayer bonding of asphalt layers compacted in the laboratory and in the field. To measure the interlayer bonding at a temperature of 20°C the Leutner test apparatus was used and load was applied at a rate of 50 mm/minute. Three types of interlayer interfaces were tested: no tack coat and tack coats made of two types of the pure bitumen emulsions. Four compaction techniques were...

    Full text to download in external service

  • Magnetic disturbances caused by magnetic contamination of plastics

    In the study of low magnetic fields precision magnetometers working in a differential system are used. Two optically pumped magnetometers working in a differential system allow for precise measuring of disturbances in the magnetic field. In order to attain high accuracy of magnetic field measurement, it is necessary to use appropriate materials for the construction of a magnetometric system, particularly of those located closely...

    Full text available to download

  • Defending against Fake VIP in Scant-Transparency Information Systems with QoS Differentiation

    Publication

    In client-server information systems with quality of service (QoS) differentiation, Client may deplete Server’s resources by demanding unduly high QoS level. Such QoS abuse has eluded systematic treatment; known defenses using Client authorization, payments, or service request inspection prior to QoS assignment, are heuristic and environment-specific. We offer a game-theoretic approach on the premise that a service request is occasionally...

    Full text available to download

  • Advanced oxidation processes for the removal of mono and polycyclic aromatic hydrocarbons – A review

    Publication

    Aromatic hydrocarbons (AHs) are toxic environmental contaminants presented in most of the environmental matrices. Advanced oxidation processes (AOPs) for the removal of AHs in the account of complete mineralization from various environmental matrices have been reviewed in this paper. An in-depth discussion on various AOPs for mono (BTEX) and polyaromatic hydrocarbons (PAHs) and their derivatives is presented. Most of the AOPs were...

    Full text available to download

  • Device-independent quantum key distribution based on measurement inputs

    Publication

    - PHYSICAL REVIEW A - Year 2015

    We provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....

    Full text available to download

  • Analysis of the Ways to Identify Rail Running Surface Defects by Means of Vibration Signals

    Publication

    - Problemy Kolejnictwa - Year 2020

    Th e article discusses a preliminary concept of a method enabling the identifi cation of chosen rail running surface defects, such as squats, spalling, and running surface defects, by analysing the parameters of vibration signals. It features a description of the methodology of the conducted tests, the scope thereof, and the selection of the measurement points with specifi c defect types. Th e article covers selected results of...

    Full text available to download

  • Distributed protection against non-cooperative node behavior in multi-hop wireless networks

    Publication

    An important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...

  • Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm

    Publication

    - Year 2014

    We consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...

    Full text to download in external service

  • Security Information Sharing for the Polish Power System

    Publication

    - Year 2015

    The Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...

  • Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining

    This paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via...

    Full text to download in external service

  • RECODIS: Resilient Communication Services Protecting End-user Applications from Disaster-based Failures

    Publication
    • J. Rak
    • D. Hutchison
    • E. Calle
    • T. Gomes
    • M. Gunkel
    • P. Smith
    • J. Tapolcai
    • S. Verbrugge
    • L. Wosinska

    - Year 2016

    Disaster-based failures can seriously disrupt any communication network, making its services unavailable. Such disruptions may be caused by natural disasters, technology-related failures, or malicious attacks, and they are observably increasing in number, intensity and scale. When network services that are a part of critical infrastructure become unavailable, commercial and/or societal problems are inevitable. The issue of limiting...

    Full text to download in external service

  • Service-based Resilience for Embedded IoT Networks

    Publication

    - Year 2020

    Embedded IoT networks are the backbone of safety-critical systems like smart factories, autonomous vehicles, and airplanes. Therefore, resilience against failures and attacks should be a prior concern already in their design stage. In this study, we introduce a service-based network model as an MILP optimization problem for the efficient deployment of a service overlay to the embedded network by meeting QoS and resilience requirements....

    Full text to download in external service

  • Improving the Survivability of Carrier Networks to Large-Scale Disasters

    Publication
    • A. de Sousa
    • J. Rak
    • F. Barbosa
    • D. Santos
    • D. Mehta

    - Year 2020

    This chapter is dedicated to the description of methods aiming to improve the survivability of carrier networks to large-scale disasters. First, a disaster classification and associated risk analysis is described, and the disaster-aware submarine fibre-optic cable deployment is addressed aiming to minimize the expected costs in case of natural disasters. Then, the chapter addresses the improvement of the network connectivity resilience...

    Full text to download in external service

  • Dynamical description of quantum computing: generic nonlocality of quantumnoise

    Publication

    We develop a dynamical non-Markovian description of quantum computing in the weak-coupling limit, in the lowest-order approximation. We show that the long-range memory of the quantum reservoir (such as the 1/t4 one exhibited by electromagnetic vacuum) produces a strong interrelation between the structure of noise and the quantum algorithm, implying nonlocal attacks of noise. This shows that the implicit assumption of quantum error...

    Full text available to download

  • Several notes on technical modernization of a historical building

    Publication

    - Year 2013

    This paper describes methods and means used during the renovation process of several elements of a building – the assembly hall, inner courtyards and attics of the main building at Gdansk University of Technology, both in design and construction domains. A tissue of a historic building required special approach to these tasks, with special emphasis on good recognition of problems, careful planning and consistent implementing of...

    Full text to download in external service

  • MEASUREMENT O F HEALTHCARE SYSTEM EFFICIENCY IN OECD COUNTRIES

    Increased spending on healthcare systems in many countries tends to attract attention to their efficiency. The aim of this paper is to evaluate the efficiency of healthcare systems in the OECD countries and indicate causes of inefficiency by applying Data Envelopment Analysis (DEA) and using additive and super-efficiency models. The homogeneity of the sample is assessed and outliers are excluded. A ranking is established on the...

    Full text available to download

  • The complete lists of 1D reversible number-conserving cellular automata with radius one of up to 7 states

    Open Research Data
    open access

    This dataset contains complete lists of all one-dimensional reversible number-conserving k-ary cellular automata with radius one of up to 7 states, i.e. with state sets {0,1}, {0,1,2}, {0,1,2,3}, {0,1,2,3,4}, {0,1,2,3,4,5} and {0,1,2,3,4,5,6}.

  • Deep eutectic solvents vs ionic liquids: Similarities and differences

    Publication

    - MICROCHEMICAL JOURNAL - Year 2020

    Deep eutectic solvents (DES) were introduced as an alternative to ionic liquids (IL) to overcome the drawbacks of IL solvents. However, some authors consider them to be a subclass of ILs. In contrast, other authors emphasize that these are by their nature independent, different groups of substances. Thus, the question arises: Which solvent group should DESs belong to? Maybe a new class should be added to the existing ones. The...

    Full text available to download

  • Threat intelligence platform for the energy sector

    In recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...

    Full text available to download