Filters
total: 1542
-
Catalog
displaying 1000 best results Help
Search results for: ATTACK SCENARIO
-
Improvement of Fingerprinting Method based on Hill Cipher by using Frequency Domain
PublicationThe main goal of this paper is to present the advantages of a digital fingerprinting in a frequency domain over a pixel domain, in case of VoD services (Video on Demand). The paper presents basic issues of a multimedia data protection by digital fingerprinting. It also describes threats to embedded fingerprints from both collusion attacks and from a transmission itself. Possible solution was presented on the example of the DCT...
-
MATHEMATICAL MODELING OF FLOOD MANAGEMENT SYSTEM IN THE CITY OF GDAŃSK, ORUŃSKI STREAM CASE STUDY
PublicationAim of the study This study analyses the efficiency of flood protection in a small urban catchment, based on a system of small reservoirs. Material and methods To assess the flood routing and surge reduction, a mathematical model of the river catchment was implemented. This was a lumped hydrological model, based on the SCS-CN method. Channel routing was performed, using kinematic wave equation. The sub-catchments have been determined...
-
Comparative study on total nitrogen prediction in wastewater treatment 1 plant and effect of various feature selection methods on machine learning algorithms performance
PublicationWastewater characteristics prediction in wastewater treatment plants (WWTPs) is valuable and can reduce the number of sampling, energy, and cost. Feature Selection (FS) methods are used in the pre-processing section for enhancing the model performance. This study aims to evaluate the effect of seven different FS methods (filter, wrapper, and embedded methods) on enhancing the prediction accuracy for total nitrogen (TN) in the WWTP...
-
Measurements of High-Speed Data Transmission Radio Link for Special Applications
PublicationIn the article measurements of high-speed data transmission radio link for special applications were presented. Build measurement stand, measurement scenario and obtained results were briefly described. All conducted research work took place in real maritime environment.
-
Taxonomy of Schemes for Resilient Routing
PublicationThis chapter provides a taxonomy of schemes for resilient routing followed by a discussion of their application to contemporary architectures of communication networks. In particular, a general classification of schemes for resilient routing is first presented followed by a description of the reference schemes for IP networks. The chapter in its later part focuses on the representative techniques of resilient routing for a multi-domain...
-
Analysis of impact of lossy audio compression on the robustness of watermark embedded in the DWT domain for non-blind copyright protection
PublicationA methodology of non-blind watermarking of the audio content is proposed. The outline of audio copyright problem and motivation for practical applications are discussed. The algorithmic theory pertaining watermarking techniques is briefly introduced. The system architecture together with employed workflows for embedding and extracting the watermarks are described. The implemented approach is described and obtained results are reported....
-
Ring Opening of Triflates Derived from Benzophospholan-3-one Oxides by Aryl Grignard Reagents as a Route to 2‑Ethynylphenyl(diaryl)phosphine Oxides
PublicationA new simple method for the synthesis of 2-ethynylphenyl(diaryl)phosphine oxides via ring opening of benzophosphol-3-yl triflates has been developed. This process occurs via nucleophilic attack of a Grignard reagent at the phosphorus center, which results in ring opening and cleavage of a leaving group. The reaction proceeds under mild conditions and, within 15−60 min, leads to a library of previously unavailable 2-ethynylphenylphosphine...
-
Measurement of the tram rail profile during a year of operation - supplementary data
Open Research DataThe aim of the work was to analyze the wear of rails during operation and to analyze the supplementation of heavy metals in the soil around the tram route, originating from wearing out rails and tram wheels.The dataset contains measurements of rail head coordinates in 9 research sections made in 8 measurement series. The wear of the rails in selected...
-
Collision-free network exploration
PublicationMobile agents start at different nodes of an n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round two agents may occupy the same node. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest time required to reach a configuration in which each agent has visited all nodes and returned to its starting location. In...
-
Detailed investigation of the phase transition inKxP4W8O32and experimental arguments for a charge density wave due to hidden nesting
PublicationDetailed structural and magnetotransport properties of monophosphate tungsten bronze Kx(PO2)4(WO3)8 single crystals are reported. Both galvanomagnetic and thermal properties are shown to be consistent with a charge density wave electronic transition due to hidden nesting of the quasi-1D portion of the Fermi surface. We also observe the enhancement of electronic anisotropy due to reconstruction of the Fermi surface at the Peierls...
-
Flood Classification in a Natural Wetland for Early Spring Conditions Using Various Polarimetric SAR Methods
PublicationAbstract--- One of the major limitations of remote sensing flood detection is the presence of vegetation. Our study focuses on a flood classification using Radarsat-2 Quad-Pol data in a natural floodplain during leafless, dry vegetation (early spring) state. We conducted a supervised classification of a data set composed of nine polarimetric decompositions and Shannon entropy followed by the predictors' importance estimation to...
-
Determination of causes of accelerated local corrosion of austenitic steels in water supply systems
PublicationThis paper concerns an inspection of a water supply system, made of AISI 304 steel, which showed signs of local corrosion at the weld. Such corrosion caused material perforation after very short periods of operation. It was revealed that steel was sensitised during the welding process. It was also proven that chromium micro-segregation occurred in the alloy leading to galvanic cell formation which initialised the process of pitting...
-
Modelowanie systemów energetycznych wytwarzania energii elektrycznej i ciepła do celów planowania rozwoju - wybrane zagadnienia
PublicationSystemy energetyczne wymagają przemian technologicznych w kierunku neutralności klimatycznej. W Polsce, w której systemie elektroenergetycznym i systemach ciepłowniczych dominują przestarzałe elektrownie i ciepłownie węglowe, dążenie do minimalizacji wpływu na środowisko wiąże się z wysokimi kosztami. Dlatego należy szukać optymalnych ścieżek roz-woju energetyki, aby osiągnąć ambitne długoterminowe cele strategiczne, przy minimalizacji...
-
Impact of radio wave polarisation on off-body communications in indoor environments
PublicationThis paper describes the measurements and the analysis of the impact of radio wave polarisation on off-body communications in Body Area Networks in indoor environments. Measurements on polarisation impact are briefly described. Five investigated scenarios with different body postures and different antenna placements are characterised. The difference between the vertical and horizontal components of the received radio signal are...
-
Maritime traffic situation awareness analysis via high-fidelity ship imaging trajectory
PublicationSituation awareness provides crucial yet instant information to maritime traffic participants, and significant attentions are paid to implement traffic situation awareness task via various maritime data source (e.g., automatic identification system, maritime surveillance video, radar, etc.). The study aims to analyze traffic situation with the support of ship imaging trajectory. First, we employ the dark channel prior model to...
-
Rafał Leszczyna dr hab. inż.
PeopleDr hab. Rafal Leszczyna is an associate professor at Gdansk University of Technology, Faculty of Management and Economics. He holds the M.Sc. degrees of Computer Science and Business Management. In December, 2006 he earned a Ph.D. in Computer Science, specialisation - Computer Security at the Faculty of Electronics, Telecommunications and Informatics of Gdansk University of Technology. Between 2004 and 2008 he worked in the European...
-
Microscopic examination of the texture of paper products
Open Research DataAtomic force microscopy (AFM) can be used to study the state of the paper fibers with the aim of providing qualitative and semi-quantitative information on degradation and aging. The work [1] reports the results of tests of various paper products subjected to deliberate aging processes under the influence of various factors. Chemical and biological...
-
Possible uses of crisis situation aiding system in virtual world simulation
PublicationMany of the real world crisis situations like spreading fire, hostile units attack, flood, and etc. are commonly used in computer games where a simulation of extensive virtual world is crucial. This paper presents some ideas for possible uses of existing crisis situation aiding system in such environments. Moreover, it shows how this kind of system can be taught during subsequent games with a large number of players. As an example...
-
Mesh dependence study for numerical assessment of hydrodynamic characteristics of windsurfing fin
PublicationThe presented research aims to assess the drag coefficient and lift coefficient versus angle of attack curves for windsurfing fin. Special attention in the research was being paid to the evaluation of the stall angle value. The angle of incidence for which the stall occurs was searched, and the sensitivity of the solution for the mesh resolution was studied. The mesh resolution sensitivity analysis was done by systematically decreasing...
-
Porównanie algorytmów lokalizacji wewnątrzbudynkowej bazujących na radiowych pomiarach odległości
PublicationNiniejszy artykuł ma na celu ocenę wybranych algorytmów estymacji położenia, które mogą być zastosowane w systemach lokalizacji w środowiskach zamkniętych. Przedstawiono pięć algorytmów bazujących na pomiarach odległości. Następnie porównano ich dokładności estymacji w warunkach statycznych oraz dla scenariusza dynamicznego przy ustalonym rozmieszczeniu trzech stacji referencyjnych. Dokonano również porównania czasu estymacji pojedynczej...
-
Fast Fading Influence on the Deep Learning-Based LOS and NLOS Identificationin Wireless Body Area Networks
PublicationIn the article, the fast fading influence on the proposed DL (Deep Learning) approach for LOS (Line-of-Sight) and NLOS (Non-Line-of-Sight) conditions identification in Wireless Body Area Networks is investigated. The research was conducted on the basis of the off-body communication measurements using the developed mobile measurement stand, in an indoor environment for both static and dynamic scenarios. The measurements involved...
-
Biometric identity verification
PublicationThis chapter discusses methods which are capable of protecting automatic speaker verification systems (ASV) from playback attacks. Additionally, it presents a new approach, which uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. We show that in this case training the system with large amounts of spectrogram patches may be difficult, and...
-
Robert Skrzypczyński dr inż.
PeopleFaculty Member at the Gdansk University of Technology, Department of Urban Design and Regional Planning. My research interests revolve around modelling degrowth-oriented urban/regional metabolism scenarios as well as policy formulation for degrowth transitions.
-
The Novel Findings About the Hussite’s Warfares in the Gdansk/Danzig Surrounding in the Late Summer of 1433
PublicationOne of the most spectacular episodes during the Hussite Wars was the Czech raid through the lands of the Teutonic Order up to the Baltic Sea in 1433. Although historians and then-witnesses focused on the sacked Cistercian Abbey in Oliva and soldiers filling the bottles with seawater, the scale of damages in the main harbour of Prussia and its surroundings has not been the subject of research yet. Furthermore, most scholars treatthe...
-
Synergistic effect of TiO2 photocatalytic advanced oxidation processes in the treatment of refinery effluents
PublicationDifferent types of photolytic and photocatalytic advanced oxidation processes (AOPs) were used for treatment of refinery effluents from bitumen production. The treatment efficiency was evaluated by analyzing chemical oxygen demand (COD), biological oxygen demand (BOD5), volatile organic compounds (VOCs) and sulfide ions concentration. The studies revealed a synergistic effect of application of external oxidants (O3, H2O2, O3/H2O2)...
-
Computational Approach towards Repetitive Design Tasks: The Case Study of Parking Lot Automated Design
PublicationThe study aims to develop and assess an algorithm for efficiently generating parking spot layouts within predefined area outlines. The algorithm is an attempt to streamline the decisionmaking process by producing different design variants and optimizing the utilization of available space. The algorithm’s primary objective is to streamline decision-making by generating diverse design variants while optimizing the use of available...
-
Sewage sludge co-pyrolysis with agricultural/forest residues: A comparative life-cycle assessment
PublicationThis study aims to determine the sustainability and energy efficiency of co-pyrolysis scenarios as treatment processes for municipal sewage sludge through a life cycle assessment (LCA). In addition, sensitivity and energy recovery analyses are conducted to determine the possible methods for optimizing the co-pyrolysis process from a circular bioeconomy perspective. Corncob and wood residue have been selected as potential co-feed...
-
CFD modeling of a diesel evaporator used in fuel cell systems
Publication -
CFD analysis of jet flows ejected from different nozzles
Publication -
A novel hybrid adaptive framework for support vector machine-based reliability analysis: A comparative study
PublicationThis study presents an innovative hybrid Adaptive Support Vector Machine - Monte Carlo Simulation (ASVM-MCS) framework for reliability analysis in complex engineering structures. These structures often involve highly nonlinear implicit functions, making traditional gradient-based first or second order reliability algorithms and Monte Carlo Simulation (MCS) time-consuming. The application of surrogate models has proven effective...
-
Pounding between high-rise buildings with different structural arrangements
PublicationEarthquake-induced structural pounding has led to significant damages during previous earthquakes. This paper investigates the effect of pounding on the dynamic response of colliding high-rise buildings with different structural arrangements. Three 3-D buildings are considered in the study, including 5-storey building, 7-storey building and 9-storey building. Three pounding scenarios are also taken into account, i.e. pounding between...
-
Optimised Robust Placement of Hard Quality Sensors for Robust Monitoring of Quality in Drinking Water Distribution Systems
PublicationA problem of optimised robust placement of the hard quality sensors in Drinking Water Distribution Systems under several water demand scenarios for robust quality monitoring is formulated. Numerical algorithms to solve the problem are derived. The optimality is meant as achieving at the same time a desired trade off between the sensor capital and maintenance costs and resulting robust estimation accuracy of the monitoring algorithm...
-
Measurement of the tram rail profile during a year of operation
Open Research DataThe aim of the work was to analyze the wear of rails during operation and to analyze the supplementation of heavy metals in the soil around the tram route, originating from wearing out rails and tram wheels.The dataset contains measurements of rail head coordinates in 9 research sections made in 8 measurement series. The wear of the rails in selected...
-
Blackout initial disturbances in electric Power System searching
PublicationThe paper contains short survey of the blackouts that took place in the last few years. The sources and initial disturbances are discussed. The typical scenario of the disturbance, leading to blackout in the electrical power system are presented.Next, models of a power system eligible to considered topic are discussed. Finally the algorithm of the blackout initial disturbances in power system searching is presented.The consideration...
-
Current trends in the field of steganalysis and guidelines for constructions of new steganalysis schemes
PublicationThe paper concerns blind steganalysis techniques in the passive steganalysis scenario designed to detect the steganographic cover modification schemes. The goal is to investigate the state-of-art in the field of steganalysis, and, above all, to recognize current trends existing in this field and determine guidelines for constructions of new steganalysis schemes. The intended effects are to examine the possibilities for the development...
-
Controlling nodal displacement of pantographic structures using matrix condensation and interior-point optimization: A numerical and experimental study
PublicationThis study presents an innovative approach for the precise control of nodal displacements in pantographic structures. The method is founded on the Matrix Condensation of Force Method, seamlessly integrated with an Interior Point Optimization algorithm. This combination offers a unique advantage by allowing users to manipulate displaced nodes within a defined coordination domain. Furthermore, this approach introduces the Interior...
-
Subrahmanyam Sappati Ph. D
PeopleTenure track faculty position at the Gdansk University of Technology, Gdansk, Poland. (Nobelium grant fellow)! Working on the behavior of short hydrogen bonds SB both in-ground and excited state in crystals, aqueous & bio environ
-
Influence of windsurfing fin stiffness distribution on the lift-drag characteristics
PublicationThis article addresses the problem of determining the hydromechanical loads generated by flexible hydrofoils. The research was done on the example of the composite windsurfing fin for the RS:X monotype class. Despite the assumption of fins identity, everyday practice showed that variations of mechanical properties occur and strongly affect their performance. Therefore, we decided to study the differences between the windsurfing...
-
Simulating Malware with MAlSim
PublicationThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating malware with MAlSim
PublicationThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Architektura pomników poświęconych ofiarom ataków terrorystycznych jako kontynuacja realizacji komemoratywnych kształtowanych w postpamięci
Publicationarchitecture of Memorials Dedicated to the Victims of terrorist attacks as a continuation of commemorative Structures created within Post-memory Having the rich art of commemorating events of the Second World War as a key reference, this article will try to show how contemporary architectural interven- tions in public space make attempts to respond to the social need of dealing with traumatic events and formulating a new attitude...
-
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting
PublicationNDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...
-
Government in the metaverse: Requirements and suitability for providing digital public services
PublicationDigital government comprises all means to enable governments to interact with their constituents digitally. The metaverse provides a virtual reality environment where various activities can be carried out without physically visiting the places of interest, including the public authorities. Yet, how governments can use the metaverse is unknown. This paper aims to extend the understanding of the metaverse architecture requirements...
-
An optimized system for sensor ontology meta-matching using swarm intelligent algorithm
PublicationIt is beneficial to annotate sensor data with distinct sensor ontologies in order to facilitate interoperability among different sensor systems. However, for this interoperability to be possible, comparable sensor ontologies are required since it is essential to make meaningful links between relevant sensor data. Swarm Intelligent Algorithms (SIAs), namely the Beetle Swarm Optimisation Algorithm (BSO), present a possible answer...
-
Service and Path Discovery Extensions for Self-forming IEEE 802.11s Wireless Mesh Systems
PublicationWith the rapid growth of the quantity and capabilities of end-user electronic devices, both stationary and mobile, they are employed in increasing number of applications. In this situation, wireless network technologies begin to play a crucial role as networks access technologies, as cable-based solutions tend to be of limited utility in case of easily portable or mobile devices. Resulting development of wireless technologies reached...
-
Analysis of impact of audio modifications on the robustness of watermark for non-blind architecture
PublicationThe aim of this paper is to assess the robustness of the non-blind audio content watermarking scheme proposed by the authors. The authors present the architecture of the designed system along with the employed workflows for embedding and extracting the watermark followed by the implementation phase description and the analysis of the experimental results. Some possible attack simulations on the embedded watermarks are reviewed,...
-
Coastal Cliffs Monitoring and Prediction of Displacements Using Terrestial Laser Scanning
PublicationCoastal cliffs are very sensitive to degradation caused by erosion and abrasion. Thus, it is very important to monitor susceptibility of the cliffs in terms of slope angles and ground fall resulting from vertical morphology of the cliffs. The results could be used for example to establish the boundaries of the safe investments zone or retreat infrastructure buildings in case of real threat such as degradation of the objects of...
-
Diver Observations by Means of Acoustic Methods
PublicationSearching for objects, especially small ones, moving under water near its the free surface, is always not an easy task. Designing tools for the detection of such targets is a real challenge when the possibility of a terrorist attack is a real threat. This paper presents some aspects of diver detection by means of acoustics methods, both active (side scan sonar) and passive ones (linear receiving antenna). This approach is quite...
-
Energy Recovery Analysis in A-Type Pressure Regulation and Measurement Stations in Istanbul, Esenyurt
Publication -
Applying Web 2.0 Concepts to Creating Energy Planning Portal
PublicationCommunity authorities in Europe are tasked to create Advanced Local Energy Plans (ALEP), which encompasses collecting local data on current energy use and generation, as well as generating future development scenarios. Both the data and the development scenarios must be publicly accessible as a basis for energy-related decisions taken by residents, local companies and other local institutions. The data must partially be collected...