Filters
total: 876
Search results for: JAMMING ATTACKS
-
Jaising Toppo PhD (Pursuing)
People -
Representativity of ISO test track surface based on controlled pass-by measurements
PublicationWithin the Polish-Norwegian research project ELANORE, a limited Round Robin Test has been performed on four ISO tracks in Northern Europe. The basic objective of the project is to improve the EU directive on labelling of tyres for noise and rolling resistance. This directive is based on the measurement procedures proscribed in the UNECE Reg.117. Measurements on 3 ISO tracks were performed in 2021 and presented at InterNoise 2022....
-
Enhancing the Seismic Resistance of Columns by GFRP Confinement Using Flexible Adhesive-Experimental Study
PublicationIn this paper, the results of two experiments, focused on testing the effectiveness of a method of enhancing the seismic (dynamic) resistance of masonry columns with the use of flexible polymer adhesive, are shown. The first experiment was devoted to investigate the damping properties of a polymer working between two stiff layers, whereas the aim of the second one was to verify if the identified damping properties of the polymer...
-
Possible uses of crisis situation aiding system in virtual world simulation
PublicationMany of the real world crisis situations like spreading fire, hostile units attack, flood, and etc. are commonly used in computer games where a simulation of extensive virtual world is crucial. This paper presents some ideas for possible uses of existing crisis situation aiding system in such environments. Moreover it shows how this kind of system can be taught during subsequent games with a large number of players.
-
Możliwości zamiany elektrycznych przepływomierzy powietrza stosowanych w silnikach spalinowych samochodów
PublicationW artykule przedstawiono podstawowe typy przepływomierzy powietrza, stosowane w silnikach spalinowych samochodów: z klapąspiętrzającą, HLM, HFM, Vortex i MAP. Przedstawiono wyniki badania tych przepływomierzy na specjalnie przygotowanym stanowisku pomiarowym. Przeanalizowano możliwość ich zamiany i zweryfikowano taką możliwość w praktyce.
-
Power equalization of AES FPGA implementation
PublicationThis paper briefly introduces side channel attacks on cryptographic hardware with special emphasis on differential power analysis(DPA). Based on existing countermeasures against DPA, design method combining power equalization for synchronous and combinatorialcircuits has been proposed. AES algorithm has been implemented in Xilinx Spartan II-E field programmable gate array (FPGA) deviceusing the standard and power-equalized methods....
-
From Regenerative Buildings to Regenerative Urban Projects: Design frameworks to scale up within the area of regenerative practice
PublicationIn this chapter, a discussion will be presented of design frameworks and assessment tools that are useful for boosting the scale jumping of regenerative design practices and the paradigm shift. Our main objectives will be to identify existing design and assessment frameworks, to describe the way they work and how they can contribute to scale-jumping regenerative design, as well as to identify shortcomings and opportunities. We...
-
Sonar Pulse Detection Using Chirp Rate Estimation and CFAR Algorithms
PublicationThis paper presents a new approach to sonar pulse detection. The method uses chirp rate estimators and algorithms for the adaptive threshold, commonly used in radiolocation. The proposed approach allows detection of pulses of unknown parameters, which may be used in passive hydrolocation or jamming detection in underwater communication. Such an analysis is possible thanks to a new kind of imaging, which presents signal energy in...
-
Realizacja mobilnego urządzenia do wytwarzania kurtyny elektromagnetycznej do zastosowań specjalnych
PublicationIn the article the assumptions, design and realisation of the technological demonstrator of a mobile device for generating an electromagnetic curtain (AEGIS) were presented, both in the area of hardware and software. The device is designed to block radio communication by which it is possible to detonate the Radio Controlled Improvised Explosive Devices (RCIEDs). The preliminary laboratory tests of the demonstrator for generating...
-
Polymeric Bearings as a new base isolation system suitable for mitigating machine-induced vibrations
PublicationThe present paper summarizes the preliminary results of the experimental shaking table investigation conducted in order to verify the effectiveness of a new base isolation system consisting of Polymeric Bearings in reducing strong horizontal machine-induced vibrations. Polymeric Bearing considered in the present study is a prototype base isolation system, which was constructed with the use of a specially prepared flexible polymer...
-
Collective angst and collective action for progressive city policies: study1
Open Research DataPaweł Adamowicz, the liberal mayor of Gdańsk, died on January 14, 2019, after being stabbed by a man who rushed onstage during a charity event. Three studies were carried out to analyze the predictors of willingness to engage in collective action for the support of the progressive city policies he initiated. In this study 1 (N = 214), the questionnaire,...
-
Fashion Games, Fashion in Games and Gamification in Fashion. A First Map
PublicationFashion companies have been using different forms of entertainment such as film and television, sport, music, museums, and photography as inspiration sources and as communication and marketing channels for decades. However, in recent years, they have also started to consider the gaming world. While gaming offers a potential revenue stream from sales of physical and digital clothing, change in it is also the gateway to access new...
-
Forced vibrations in a dynamic system that is damped by a mechanism that trans-pass through its singular position
PublicationIn the paper, vibrations of a hybrid multibody-continuous system are investigated. For all the mechanical devices, effective damping methods are crucial in the design process. To obtain it, installation of viscous dampers or elasto-viscous elements is dominant. In the paper, an alternative method is investigated. It is based on modal disparity. To describe the method briefly, when structural damping is present in continuous systems,...
-
Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia
PublicationThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). The solution proposed here is a new joint fingerprinting and decryption method which meets the requirements for both imperceptibility and robustness of fingerprints and scalability in terms of design and distribution of fingerprinted multimedia content. The proposed method uses a simple block cipher based on matrix...
-
Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management
PublicationThis article outlines an integrated functional safety and cybersecurity evaluation approach within a framework for business continuity management (BCM) in energy companies, including those using Industry 4.0 business and technical solutions. In such companies, information and communication technology (ICT), and industrial automation and control system (IACS) play important roles. Using advanced technologies in modern manufacturing...
-
Heave Plates with Holes for Floating Offshore Wind Turbines
PublicationThe paper presents an innovative solution which is heave plates with holes. The long-known heave plates are designed to damp the heave motion of platforms. They are most often used for Spar platforms. The growing interest in this type of platform as supporting structures for offshore wind turbines makes it necessary to look for new solutions. Based on the available literature and the authors’ own research, it was concluded that...
-
Evolutionary Ship Track Planning within Traffic Separation Schemes – Evaluation of Individuals
PublicationThe paper presents an extended version of the author’s Evolutionary Sets of Safe Ship Trajectories method. The method plans safe tracks of all ships involved in an encounter including speed reduction manoeuvres, if necessary, and taking into account Rule 10 of COLREGS, which specifies ships’ behaviour within Traffic Separation Schemes governed by IMO. The paper focuses on the evaluation phase of the evolutionary process and shows...
-
Numerical Modeling of Water and Ice Dynamics for Analysis of Flow Around the Kiezmark Bridge Piers
PublicationThis paper presents the results of a numerical model study on the effect of ice on the proposed bridge piers in the Vistula River outlet and its effect on flow conditions in the river. The model DynaRICE is used in this study, which is a two-dimensional hydro-ice dynamic numerical model developed for dynamic ice transport and jamming in rivers. To simulate river hydrodynamics in the vicinity of the bridge piers, 2-dimensional numerical...
-
AEGIS – Mobile Device for Generating Electromagnetic Curtain for Special Applications and Countering the Threats of RCIED
PublicationIn the article the assumptions, design and realization of the technological demonstrator of a mobile device for generating an electromagnetic curtain (with a cryptonym AEGIS) were presented, both in the area of hardware and software. The device is designed to block the radio communication systems by which it is possible to detonate the Radio Controlled Improvised Explosive Devices (RCIEDs). The preliminary laboratory tests of the...
-
Ring Opening of Triflates Derived from Benzophospholan-3-one Oxides by Aryl Grignard Reagents as a Route to 2‑Ethynylphenyl(diaryl)phosphine Oxides
PublicationA new simple method for the synthesis of 2-ethynylphenyl(diaryl)phosphine oxides via ring opening of benzophosphol-3-yl triflates has been developed. This process occurs via nucleophilic attack of a Grignard reagent at the phosphorus center, which results in ring opening and cleavage of a leaving group. The reaction proceeds under mild conditions and, within 15−60 min, leads to a library of previously unavailable 2-ethynylphenylphosphine...
-
Identification of dynamic parameters in the context of diagnostics of steel tank with different level of liquid.
PublicationThe paper presents an experimental study to identify the dynamic parameters of a water-filled tank model. The experimental modal analysis approach involving the excitation at one point of the structure and acquisition of vibra tions at selected points distri buted over the tank surface allowed to determine the resonance frequencies, mode shapes and damping ratios. The main aim of the research was to examine the influence of...
-
MODELLING OF THE VISCOSITY EFFECT OF HEAVE PLATES FOR FLOATING WIND TURBINES BY HYDRODYNAMIC COEFFICIENTS
PublicationOne of the methods of modelling the movement of floating wind turbines is the use of the diffraction method. However, this method does not take into account the influence of viscosity; therefore, in many cases, it needs to be extended with a matrix of appropriate coefficients. The effect of viscosity causes both the added mass coefficient and the damping coefficient to increase. The determined coefficients were entered into the...
-
Planning of the green road system as an element of spatial management in suburbs and small towns
PublicationThe premise for the development of sustainable forms of road infrastructure in small towns is the appropriate plan at an early stage or modifi cation in the case of existing spaces. A multi-directional approach is extremely important, which takes into account the specifi city of the regional (country) road system, availability, and capacity of traffi c network, but also social and environmental factors. Effi cient management...
-
Determination of causes of accelerated local corrosion of austenitic steels in water supply systems
PublicationThis paper concerns an inspection of a water supply system, made of AISI 304 steel, which showed signs of local corrosion at the weld. Such corrosion caused material perforation after very short periods of operation. It was revealed that steel was sensitised during the welding process. It was also proven that chromium micro-segregation occurred in the alloy leading to galvanic cell formation which initialised the process of pitting...
-
Images of topography and mechanical properties (phase imaging) of cast iron samples from water installations
Open Research DataMeasurements in contact and semi-contact mode. NTEGRA Prima (NT-MDT) device. CSG 10.
-
Patrycja Klimas dr hab.
PeoplePatrycja Klimas is an associate professor at Wroclaw University of Economics and Business in the Department of Advanced Research in Management. As a researcher, she researches within strategic management, focused on inter-organizational cooperation and coopetition considered under dyads, networks, and different types of ecosystems. Based on her research mainly on the aviation and the video game industry, she published several papers...
-
ISO test track influence on the EU tyre label noise value
PublicationIn 2009, the European Union (EU) introduced a directive governing the labelling of tyres, which underwent revision in 2020. This labelling system encompasses three key parameters related to tyre performance: wet grip (safety), rolling resistance (energy consumption), and external rolling noise (environmental impact). These label values serve as crucial information for customers seeking to purchase replacement tyres for their vehicles....
-
Experimental research on water lubricated three layer sliding bearing with lubrication grooves in the upper part of the bush and its comparison with a rubber bearing
Publicationcomposite. Eachofitslayershasanimportantfunction.Speciallypreparedslidingsurfaceensures minimum resistance.Followingrunning-initssmoothnessbecomesveryhighandthebearingmay continue workingunder fluid lubricationregime.NBRlayerensuresbearingelasticity,goodvibration damping propertiesandinsusceptibilitytoshaftaxismisalignment.Theexternalbrasslayermakes fitting thebearingeasier. Experiment resultsoftheconductedresearchwerecomparedwiththoseforarubberbearingof similar...
-
Automatic music genre classification based on musical instrument track separation / Automatyczna klasyfikacja gatunku muzycznego wykorzystująca algorytm separacji dźwięku instrumentó muzycznych
PublicationThe aim of this article is to investigate whether separating music tracks at the pre-processing phase and extending feature vector by parameters related to the specific musical instruments that are characteristic for the given musical genre allow for efficient automatic musical genre classification in case of database containing thousands of music excerpts and a dozen of genres. Results of extensive experiments show that the approach...
-
Study of Multi-Class Classification Algorithms’ Performance on Highly Imbalanced Network Intrusion Datasets
PublicationThis paper is devoted to the problem of class imbalance in machine learning, focusing on the intrusion detection of rare classes in computer networks. The problem of class imbalance occurs when one class heavily outnumbers examples from the other classes. In this paper, we are particularly interested in classifiers, as pattern recognition and anomaly detection could be solved as a classification problem. As still a major part of...
-
Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm
PublicationWe consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...
-
Security Information Sharing for the Polish Power System
PublicationThe Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...
-
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublicationAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining
PublicationThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via...
-
Service-based Resilience for Embedded IoT Networks
PublicationEmbedded IoT networks are the backbone of safety-critical systems like smart factories, autonomous vehicles, and airplanes. Therefore, resilience against failures and attacks should be a prior concern already in their design stage. In this study, we introduce a service-based network model as an MILP optimization problem for the efficient deployment of a service overlay to the embedded network by meeting QoS and resilience requirements....
-
RECODIS: Resilient Communication Services Protecting End-user Applications from Disaster-based Failures
PublicationDisaster-based failures can seriously disrupt any communication network, making its services unavailable. Such disruptions may be caused by natural disasters, technology-related failures, or malicious attacks, and they are observably increasing in number, intensity and scale. When network services that are a part of critical infrastructure become unavailable, commercial and/or societal problems are inevitable. The issue of limiting...
-
Dynamical description of quantum computing: generic nonlocality of quantumnoise
PublicationWe develop a dynamical non-Markovian description of quantum computing in the weak-coupling limit, in the lowest-order approximation. We show that the long-range memory of the quantum reservoir (such as the 1/t4 one exhibited by electromagnetic vacuum) produces a strong interrelation between the structure of noise and the quantum algorithm, implying nonlocal attacks of noise. This shows that the implicit assumption of quantum error...
-
On the modelling of aerodynamic force coefficients for over-shroud seals of turbine stages
PublicationThis paper presents experimental investigations which made it possible to determine dynamic coefficients of labyrinth over-shroud seal of a model air turbine. The coefficients associate pressure forces with turbine rotor displacement, velocity and acceleration respective to turbine casing (linear model) and play important role in analyzing turbine-set dynamics. The obtained results indicated that involving serious errors can be...
-
DYNWIR S-70 program for modal analysis of multisupported and multimass rotors
PublicationThe article provides a brief description of the program Dynwir-S-70 (currently being developed in the Rotor Dynamics and Slide Bearings Department in the Institute of Fluid-Flow Machinery Polish Academy of Sciences in Gdansk) which is a program for analysis of multi-supported and multi-mass rotors. Used algorithms and the construction of mass and stiffness matrix were presented. Damping matrix structure based on Rayleigh damping...
-
Reliability data safety instrumented systems SIS from the functional safety analysis example critical instalation
Open Research DataThe dataset represents the results of an example of functional safety analysis systems is presented below. It is based on a control system, which consists of some basic components like sensors, programmable logic controllers and valves. It is a part of petrochemical critical installations. The communication between sensor logic controllers and actuators...
-
Possible uses of crisis situation aiding system in virtual world simulation
PublicationMany of the real world crisis situations like spreading fire, hostile units attack, flood, and etc. are commonly used in computer games where a simulation of extensive virtual world is crucial. This paper presents some ideas for possible uses of existing crisis situation aiding system in such environments. Moreover, it shows how this kind of system can be taught during subsequent games with a large number of players. As an example...
-
Mesh dependence study for numerical assessment of hydrodynamic characteristics of windsurfing fin
PublicationThe presented research aims to assess the drag coefficient and lift coefficient versus angle of attack curves for windsurfing fin. Special attention in the research was being paid to the evaluation of the stall angle value. The angle of incidence for which the stall occurs was searched, and the sensitivity of the solution for the mesh resolution was studied. The mesh resolution sensitivity analysis was done by systematically decreasing...
-
The Novel Findings About the Hussite’s Warfares in the Gdansk/Danzig Surrounding in the Late Summer of 1433
PublicationOne of the most spectacular episodes during the Hussite Wars was the Czech raid through the lands of the Teutonic Order up to the Baltic Sea in 1433. Although historians and then-witnesses focused on the sacked Cistercian Abbey in Oliva and soldiers filling the bottles with seawater, the scale of damages in the main harbour of Prussia and its surroundings has not been the subject of research yet. Furthermore, most scholars treatthe...
-
Wybrane aspekty modelowania uderzenia pojazdem dźwigara wiaduktu
PublicationW pracy przedstawiono różne zagadnienia związane z uderzeniem pojazdu w dźwigar wiaduktu. Omówiono wybór modelu obliczeniowego, na podstawie porównania wyników dla modelu dźwigara zespolonego, modelu dźwigara stalowego oraz modelu wiaduktu. Następnie opisano model dźwigara zespolonego zastosowany w analizie MES oraz metodę wyznaczania współczynników tłumienia Rayleigha. Symulację numeryczną uderzenia dźwigara wiaduktu przez koparkę...
-
Threat intelligence platform for the energy sector
PublicationIn recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...
-
Disaster-resilient communication networks: Principles and best practices
PublicationCommunication network failures that are caused by disasters, such as hurricanes, arthquakes and cyber-attacks, can have significant economic and societal impact. To address this problem, the research community has been investigating approaches to network resilience for several years. However, aside from well-established techniques, many of these solutions have not found their way into operational...
-
Some Security Features of Selected IoT Platforms
PublicationIoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...
-
Elastic waves in the railroad track substructures and its surroundings analyzed with non-classical operational methods
PublicationWe analyze the propagation of the waves generated by the rolling stock and the interaction of those waves on the medium and its surroundings. We use non-classical operational methods for monitoring construction of the railway infrastructure and for noise damping.
-
Antifungal activity of propolis extracts, screening and kinetic data
Open Research DataThis folder contains results of our studies aiming in determination of antifungal potential of ethanolic extracts of propolis and components of this product. In details, MIC, MFC values were determined and kill time assays were performed.
-
Environmental Impacts of Renewable Energy Technologies
PublicationNowadays, fossil fuels are the main sources energy from which electricity is obtained. But these sources will not last forever, so in due course renewable energies will have to replace them in this role. All energy sources have some impact on our environment. Fossil fuels — coal, oil, and natural gas — do substantially more harm than renewable energy sources by most measures, including air and water pollution, damage to public...