Search results for: ATTACK SCENARIO - Bridge of Knowledge

Search

Search results for: ATTACK SCENARIO

Search results for: ATTACK SCENARIO

  • INVESTIGATION INTO INTERFEROMETRIC SONAR SYSTEM ACCURACY

    Publication

    - HYDROACOUSTICS - Year 2015

    The results of the accuracy measurements of phase differencing bathymetric sonar (PDBS) system in shallow waters are presented in the article. The measurement results were compared with the theoretical calculations for sonar system accuracy and international standards for hydrographic surveys. The proposed formulas enable to assess a priori sonar system performance using system quality factor (SQF), which takes into account influence...

    Full text available to download

  • Sharp transitions in low-number quantum dots Bayesian magnetometry

    Publication

    - Scientific Reports - Year 2016

    We consider Bayesian estimate of static magnetic field, characterized by a prior Gaussian probability distribution, in systems of a few electron quantum dot spins interacting with infinite temperature spin environment via hyperfine interaction. Sudden transitions among optimal states and measurements are observed. Usefulness of measuring occupation levels is shown for all times of the evolution, together with the role of entanglement...

    Full text available to download

  • Experimental test of nonclassicality with arbitrarily low detection efficiency

    Publication

    - PHYSICAL REVIEW A - Year 2020

    We theoretically introduce and experimentally demonstrate the realization of a nonclassicality test that allows for arbitrarily low detection efficiency without invoking an extra assumption of independence of the devices. Our test and its implementation is set in a prepare-and-measure scenario with an upper limit on the classical communication capacity of the channel through which the systems are communicated. The essence for our...

    Full text available to download

  • Detection of illicit chemicals by portable Raman spectrometer

    The Raman spectrometers can be built as the portable devices and can be used in various places to detect illicit chemicals. This method has become popular due to deficiency of other fast methods that could be applied against terrorist attacks or could help police at their work. The conception of a portable Raman spectrometer has been presented. The description enclosures presentation of the prepared device and its possible applications...

    Full text available to download

  • Study on VR Application Efficiency of Selected Android OS Mobile Devices

    Publication

    Currently, the number of scenarios for using VR (Virtual Reality) technology grows every year. Yet, there are still issues associated with it, related with the performance of the mobile device itself. The aim of this work is to perform an analysis of the effectiveness of virtual reality applications in case of mobile platforms. We put the main emphasis on examining the performance and efficiency of four different hardware and software...

    Full text to download in external service

  • User Orientation Detection in Relation to Antenna Geometry in Ultra-Wideband Wireless Body Area Networks Using Deep Learning

    Publication

    - SENSORS - Year 2024

    In this paper, the issue of detecting a user’s position in relation to the antenna geometry in ultra-wideband (UWB) off-body wireless body area network (WBAN) communication using deep learning methods is presented. To measure the impulse response of the channel, a measurement stand consisting of EVB1000 devices and DW1000 radio modules was developed and indoor static measurement scenarios were performed. It was proven that for...

    Full text available to download

  • Measurements of Path Loss in Off-Body Channels in Indoor Environments

    Publication

    - Year 2014

    This paper presents a measurements of the path loss for validation of a statistical model for off-body radio channels in an indoor multipath environment, which considers the distance dependent mean path loss, and describes body shadowing and fast fading components in a statistical way. The measurement equipment and propagation indoor environment have been presented. Two different bodies and five static and two walking scenarios...

    Full text to download in external service

  • Incremental Dynamic Analysis and Fragility Assessment of Buildings with Different Structural Arrangements Experiencing Earthquake-Induced Structural Pounding

    Publication

    - Year 2022

    Structural pounding is considered as one of the most critical phenomena occurring during earthquakes. This paper presents the incremental dynamic analysis and fragility assessment of buildings experiencing earthquake-induced pounding. Three 3-D buildings with different number of storeys and under different structural arrangements have been considered. Three pounding scenarios have been taken into account, i.e. pounding between...

    Full text to download in external service

  • Zero-knowledge convincing protocol on quantum bit is impossible

    Publication

    - Quantum Journal - Year 2017

    It is one of fundamental features of quantum formalism that o n one hand it provides a new infor- mation processing resources and on the other hand puts funda mental constraints on the processing of quantum information implying “no-go” theorems for cloni ng [1–3], bit commitment [4, 5] and deleting [6] in quantum theory. Here we ask about possibilit y of “zero knowledge” scenario which, for its simplicity, can be considered as...

    Full text available to download

  • Numerical modeling of PFAS movement through the vadose zone: Influence of plant water uptake and soil organic carbon distribution

    In this study, we investigated the effects of soil organic carbon (SOC) distribution and water uptake by plant roots on PFAS movement in the vadose zone with a deep groundwater table under temperate, humid climate conditions. Two series of numerical simulations were performed with the HYDRUS computer code, representing the leaching of historical PFOS contamination and the infiltration of water contaminated with PFOA, respectively. We...

    Full text available to download

  • Collision-Free Network Exploration

    Publication
    • J. Czyzowicz
    • D. Dereniowski
    • L. Gąsieniec
    • R. Klasing
    • A. Kosowski
    • D. Pająk

    - Year 2014

    A set of mobile agents is placed at different nodes of a n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round may two agents occupy the same node. In each round, an agent may choose to stay at its currently occupied node or to move to one of its neighbors. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest possible...

    Full text to download in external service

  • Flooding Extent Mapping for Synthetic Aperture Radar Time Series Using River Gauge Observations

    The flooding extent area in a river valley is related to river gauge observations such as discharge and water elevations. The higher the water elevations, or discharge, the larger the flooding area. Flooding extent maps are often derived from synthetic aperture radar (SAR) images using thresholding methods. The thresholding methods vary in complexity and number of required parameters. We proposed a simple thresholding method that...

    Full text available to download

  • Receiver-side fingerprinting method based on quaternion sandwich product

    In this paper a new receiver-side fingerprinting method for color images is proposed. The proposed method belongs to the group of Joint Fingerprinting and Decryption (JFD) methods. Each component of the color image is represented as a point in 3D space, which is formed by 3 color channels. Encryption and fingerprinting can be interpreted as rotation, scaling and translation of these points. Calculations are performed using quaternion...

  • Framework for extracting rails and setting-out railway line axis based on UAV photogrammetric measurements

    Publication

    - International Journal of Rail Transportation - Year 2024

    Technical diagnostics enables assessing the current technical condition of a railway line and adjacent infrastructure, and forecasting its changes over a specific time horizon. One of its elements is the periodic monitoring of rail position and their geometry. This article presents a new framework for the setting-out of a railway track axis. The process presented in the manuscript is based on the specific filtration and extraction...

    Full text available to download

  • Impedance monitoring of fuel cell stacks

    This paper presents an innovative, electrochemical impedance method for monitoring of electrochemical behaviour of a multi-cell, direct methanol fuel cell (DMFC) device. This method not only provides classical voltage changes at successive cells but also allows their detailed impedance behaviour to be presented. Impedance characteristics of individual cells within a fuel cell stack (depending on actual operating conditions) are...

    Full text available to download

  • Approach to security assessment of critical infrastructures' information systems

    Publication

    - IET Information Security - Year 2011

    This study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...

    Full text available to download

  • High temperature corrosion of evaporator tubes with thermal sprayed coatings

    Publication

    Degradation examinations of outer surface of low-emission steam boiler evaporator tubes are presented in the paper. Metallographic evaluation of scale morphology, its micro sites chemical composition analysis and distribution of elements on cross sections have been performed. Water-wall tubes were exposed in steam boiler for up to two years period. Common tubes made of 16Mo3 steel suffered sulphide and molten salts corrosions....

    Full text to download in external service

  • A Stand for Measurement and Prediction of Scattering Properties of Diffusers

    Publication

    In this paper we present a set of solutions which may be used for prototyping and simulation of acoustic scattering devices. A system proposed is capable of measuring sound field. Also a way to use an open source solution for simulation of scattering phenomena occurring in proximity of acoustic diffusers is shown. The result of our work are measurement procedure and a prototype of the simulation script based on FEniCS - an open source...

    Full text to download in external service

  • Completely entangled subspaces of entanglement depth k

    Publication

    - PHYSICAL REVIEW A - Year 2024

    We introduce a class of entangled subspaces: completely entangled subspaces of entanglement depth k (k-CESs). These are subspaces of multipartite Hilbert spaces containing only pure states with an entanglement depth of at least k. We present an efficient construction of k-CESs of any achievable dimensionality in any multipartite scenario. Further, we discuss the relation between these subspaces and unextendible product bases (UPBs)....

    Full text available to download

  • 50’ Sail Catamaran with Hybrid Propulsion, Design, Theoretical and Experimental Studies

    The development of modern lithium batteries and propulsion systems now allows the use of complex propulsion systems for vessels of various sizes. As part of the research and implementation project, a parallel hybrid drive system was designed, built and then tested in the laboratory. The experimental studies conducted allowed for the measurements of power, fuel consumption and electric power distribution in various operating modes...

    Full text available to download

  • An Approach to Mean Path Loss Model Estimation for Off-Body Channels

    Publication

    - Year 2017

    This paper presents an approach to estimation of the mean path loss model parameters in off-body Body Area Networks channels. In this approach, the path loss exponent is constrained to a value obtained for the line-of-sight (LoS) propagation in the co-polarised channel, considering a generalised static scenario. The comparison of the goodness of fit between the proposed approach and other approaches, for a set of measurements obtained...

  • Study on AR Application Efficiency of Selected iOS and Android OS Mobile Devices

    Publication

    - Year 2022

    Currently, the number of scenarios for using AR (Augmented Reality) tools grows every year. Yet, there are still some open performance issues associated with this technology, related with the efficiency of the mobile device itself, including build-in components or the operation system. The purpose of this study was to investigate available augmented reality engines for mobile platforms. First, a review of current graphics and AR...

    Full text to download in external service

  • Virtual tour as an innovative tool for architectural education - from understanding heritage to creativity stimulation

    Publication

    The article presents the potential of the virtual tour in architectural education as an innovative tool to better understand heritage and stimulate creativity. A methodology for creating a virtual tour based on a point cloud obtained from a survey based on 360° camera images is presented. Two different purposes for the use of point clouds are presented from reliable indicators of heritage documentation useful for digital twin modelling...

    Full text to download in external service

  • Characteristics of the Polarised Off-Body Channel in Indoor Environments

    Publication

    - Year 2016

    This paper addresses the depolarisation effect in off-body Body Area Networks channels, based on measurements performed at 2.45 GHz in an indoor environment. Seven different scenarios, involving both static and dynamic users, were considered, taking a statistical perspective. The analysis of the cross-polarisation discrimination is performed, as well as the analysis of path loss in co- and cross-polarised channels. Results show...

  • Implementation of Weigh-in-Motion System in Freight Traffic Management in Urban Areas

    The article presents how the Weigh-in-Motion system can be used for managing Gdynia’s freight traffic. Potential sites for weight pre-selection were identified in an analysis of the technical and location conditions. Situated directly in the east part of the Port of Gdynia a site was selected for a pilot implementation. Theoretical scenarios were simulated using an extended WIM system as a tool for controlling access to selected...

    Full text to download in external service

  • Wpływ usług on-line na budowanie pozytywnych relacji i lojalności klienta

    W artykule omówiono wybrane problemy projektowe dotyczące współczesnych usług on-line w kontekście budowania trwałej lojalności klienta. Przedstawiono model warstwowego rozwoju usług on-line wraz z zaleceniami projektowymi zorientowanymi na budowanie i wzmacnianie lojalności klienta. Przedstawiono przykłady scenariuszy rozwoju usług e-zdrowia online. Przedstawiono możliwości dalszego rozwoju prezentowanego podejścia i plany dalszych...

    Full text available to download

  • Adapting the pinch point analysis to improve the ORC design process

    Pinch point analysis can be adapted so as to assist in the early stages of designing the ORC systems. Typically used in determining the working parameters of heat exchangers, it can be employed to improve the heat fitting between the source of heat and the working fluids of the ORC system. To attain the parametric match, an algorithm was built enabling quick estimation of the possible heat reception by the specific working fluid....

    Full text to download in external service

  • Security Requirements and Controls for Incident Information Sharing in the Polish Power System

    Publication

    Among the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...

    Full text to download in external service

  • Wideband Off-Body Channel Characteristics with Dynamic User

    Publication

    - Year 2019

    This paper presents the preliminary results of a dynamic off-body channel characterisation study, based on wideband measurements at 5.8 GHz in an indoor environment. The Channel Impulse Response (CIR) was measured for a scenario with the user approaching and departing from the off-body antenna. A CIR deconvolution procedure was performed jointly in two polarisations, and the received signal power, Cross-Polarisation Discrimination...

  • Kamila Kokot-Kanikuła mgr

    Kamila Kokot-Kanikuła is a digital media senior librarian at Gdańsk University of Technology (GUT) Library. She works in Digital Archive and Multimedia Creation Department and her main areas of interests include early printed books, digital libraries, Open Access and Open Science. In the Pomeranian Digital Library (PDL) Project she is responsible for creating annual digital plans, transferring files on digital platform, and promoting...

  • Camera sabotage detection for surveillance systems

    Publication

    Camera dysfunction detection algorithms and their utilization in realtime video surveillance systems are described. The purpose of using the proposed analysis is explained. Regarding image tampering three algorithms for focus loss, scene obstruction and camera displacement detection are implemented and presented. Features of each module are described and certain scenarios for best performance are depicted. Implemented solutions...

    Full text to download in external service

  • A Multi-Antenna Scheme for Early Detection and Mitigation of Intermediate GNSS Spoofing

    Publication

    - SENSORS - Year 2019

    This article presents a method for detecting and mitigating intermediate GNSS spoofing. In this type of attack, at its early stage, a spoofer transmits counterfeit signals which have slight time offsets compared to true signals arriving from satellites. The anti-spoofing method proposed in this article fuses antenna array processing techniques with a multipath detection algorithm. The latter is necessary to separate highly correlated...

    Full text available to download

  • Practical issues for the implementation of survivability and recovery techniques in optical networks

    Publication
    • G. Ellinas
    • D. Papadimitriou
    • J. Rak
    • D. Staessens
    • J. P. Sterbenz
    • K. Walkowiak

    - Optical Switching and Networking - Year 2014

    Failures in optical networks are inevitable. They may occur during work being done for the maintenance of other infrastructures, or on a larger scale as the result of an attack or large-scale disaster. As a result, service availability, an important aspect of Quality of Service (QoS), is often degraded. Appropriate fault recovery techniques are thus crucial to meet the requirements set by the Service Level Agreements (SLAs) between...

    Full text to download in external service

  • Enzymatic activities behind degradation of glucosinolates

    Myrosinase (thioglucosidase, EC 3.2.1.147) is the enzyme responsible for the hydrolysis of glucosinolates (GLs). In plant tissue, myrosinase and GLs are sequestered in separate cellular compartments. As a result of cell disruption, e.g., after pathogen attack or on chopping or grinding during food preparation, the myrosinase comes into contact with GLs and catalyzes the hydrolysis of thioglucosidic bond in GL structure. Consequently,...

  • Looking through the past: better knowledge retention for generative replay in continual learning

    Publication
    • V. Khan
    • S. Cygert
    • K. Deja
    • T. Trzciński
    • B. Twardowski

    - IEEE Access - Year 2024

    In this work, we improve the generative replay in a continual learning setting to perform well on challenging scenarios. Because of the growing complexity of continual learning tasks, it is becoming more popular, to apply the generative replay technique in the feature space instead of image space. Nevertheless, such an approach does not come without limitations. In particular, we notice the degradation of the continually trained...

    Full text available to download

  • Efficient bounds on quantum-communication rates via their reduced variants

    Publication

    - PHYSICAL REVIEW A - Year 2010

    We investigate one-way communication scenarios where Bob operating on his component can transfer some subsystem to the environment. We define reduced versions of quantum-communication rates and, further, prove upper bounds on a one-way quantum secret key, distillable entanglement, and quantum-channel capacity by means of their reduced versions. It is shown that in some cases they drastically improve their estimation.

    Full text available to download

  • Towards a Smart Sustainable City Roadmap

    Publication
    • G. V. Pereira
    • E. Estevez
    • R. Krimmer
    • M. Janssen
    • T. Janowski

    - Year 2019

    This workshop of the CAP4CITY (Erasmus+ Strengthening Governance Capacity for Smart Sustainable Cities) project is to promote and stimulate the discussion and networking in the area of Digital Government. Smart Sustainable Cities and related concepts of Digital, Intelligent and Smart Cities represent a progression of how cities around the world apply digital technology to serve their populations, pursue sustainable socio-economic...

    Full text available to download

  • Decisional-DNA-Based Digital Twin Implementation Architecture for Virtual Engineering Objects

    Publication

    - CYBERNETICS AND SYSTEMS - Year 2024

    Digital twin (DT) is an enabling technology that integrates cyber and physical spaces. It is well-fitted for manufacturing setup since it can support digitalized assets and data analytics for product and process control. Conventional manufacturing setups are still widely used all around the world for the fabrication of large-scale production. This article proposes a general DT implementation architecture for engineering objects/artifacts...

    Full text available to download

  • Pilotażowa instalacja sieci bezprzewodowej bezprzewodowej standardu WiMax na Politechnice Gdańskiej

    Publication

    Rozdział przedstawia analizę teoretyczną oraz opis pilotażowego wdrożenia standardu IEEE 802.11 (WiMAX) na Politechnice Gdańskiej. Przedstawiono unikalną funkcjonalność oferowaną przez technologię WiMAX według ustaleń standaryzacyjnych oraz realizowaną na dostępnych w tej chwili na rynku urządzeniach, a także możliwe scenariusze zastosowania tego rodzaju systemów

  • Evaluation of IEEE 802.21 Handover between IEEE 802.11 and UMTS Networks

    Publication

    The paper presents IEEE 802.21 - the ongoing standard for network handovers - illustrating its functional features, and considering and simulating a set of scenarios of mobile stations moving between IEEE 802.11 and UMTS networks. In order to evaluate the performance of IEEE 802.21 hanover packet loses and switching delays caused by hanover procedures are investigated. The authors discuss example results of simulation experiments...

    Full text available to download

  • Rough Set-Based Classification of EEG Signals Related to Real and Imagery Motion

    Publication

    - Year 2016

    A rough set-based approach to classification of EEG signals registered while subjects were performing real and imagery motions is presented in the paper. The appropriate subset of EEG channels is selected, the recordings are segmented, and features are extracted, based on time-frequency decomposition of the signal. Rough set classifier is trained in several scenarios, comparing accuracy of classification for real and imagery motion....

  • Design of compound curves adapted to the satellite measurements

    Publication

    The paper deals with a novelty related to the design of a region for an alternative railway track direction adequate for mobile satellite measurements. The new approach may become particularly useful in the design of the existing track axis control when the determination of both the main track directions becomes impossible. The only solution in that case is to apply to the geometrical system two circular arcs of a different radius,...

    Full text available to download

  • The process of identification of the track's geometrical layout and the alignment project based on the of satellite measurements

    Publication

    In the paper a methodology of restoring of railway track’s geometrical shape in a horizontal plane on the base of conducted mobile satellite surveying was presented. The authors proposed a calculating algorithm for designing the track sections placed in horizontal arcs. In the algorithm an analytical methodology with mathematical formulas is applied. The procedure has an universal character, i.e. provides the possibility of varying...

  • Assessment of the Speed Management Impact on Road Traffic Safety on the Sections of Motorways and Expressways Using Simulation Methods

    Publication

    - SENSORS - Year 2020

    Methods used to evaluate the impact of Intelligent Transport System (ITS) services on road safety are usually based on expert assessments or statistical studies. However, commonly used methods are challenging to apply in the planning process of ITS services. This paper presents the methodology of research using surrogate safety measures calculated and calibrated with the use of simulation techniques and a driving simulator. This...

    Full text available to download

  • Investigation of continuous wave jamming in an IEEE 802.15.4 network

    Publication

    This paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate...

    Full text to download in external service

  • Emotion recognition and its application in software engineering

    In this paper a novel application of multimodal emotion recognition algorithms in software engineering is described. Several application scenarios are proposed concerning program usability testing and software process improvement. Also a set of emotional states relevant in that application area is identified. The multimodal emotion recognition method that integrates video and depth channels, physiological signals and input devices...

    Full text to download in external service

  • Jad Tahouri Ph.D Student on Geoscience and Risk Scenario

    People

  • Resilience of 5G Mobile Communication Systems to Massive Disruptions

    Publication

    - Year 2020

    This chapter discusses vital techniques to enhance the resilience of 5G systems. It starts with dependability assessment of 5G networks. Next, it describes (a) the frequency fallback technique to improve availability and survivability of 5G services, (b) segment interleaving scheme to enhance communications resilience between base stations and the remaining part of the network and (c) multi-operator protection to address the resilience...

    Full text to download in external service

  • Analiza następstw potencjalnej awarii wanty mostu podwieszonego w Bydgoszczy

    Most Uniwersytecki został zamknięty po siedmiu latach od oddania do użytkowania. Powodem były widoczne gołym okiem objawy znacznego przeciążenia w obrębie zakotwień. Krytyczne elementy konstrukcji mostu zostały wzmocnione i przywrócono go do ruchu. W artykule przedstawiono nieliniowe analizy statyczne i dynamiczne wykonane na modelu MES, prezentujące cztery scenariusze przebiegu zachowania konstrukcji po utracie nośności mocowania...

    Full text available to download

  • Graph security testing

    Set S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...

    Full text to download in external service