Filtry
wszystkich: 4082
wybranych: 2450
-
Katalog
- Publikacje 2450 wyników po odfiltrowaniu
- Czasopisma 369 wyników po odfiltrowaniu
- Konferencje 202 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 314 wyników po odfiltrowaniu
- Projekty 14 wyników po odfiltrowaniu
- Laboratoria 1 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Aparatura Badawcza 1 wyników po odfiltrowaniu
- Kursy Online 168 wyników po odfiltrowaniu
- Wydarzenia 6 wyników po odfiltrowaniu
- Dane Badawcze 555 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: COMPUTER SECURITY LABORATORY
-
Wireless Systems of Threats Monitoring
PublikacjaThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...
-
Cybersecurity and Privacy in Standards for Smart Grids – a Comprehensive Survey
PublikacjaResilient information and communications technologies are a prerequisite for reliable operation of smart grid. In recent years, many standards for the new form of electricity network have been proposed, which results in operators and other smart grid stakeholders having difficulties in finding the documents which can be related to their particular problems. The purpose of this paper is to bring in all smart grid standards that...
-
Interaction with medical data using QR-codes
PublikacjaBar-codes and QR-codes (Quick Response ) are often used in healthcare. In this paper an application of QR-codes to exchange of laboratory results is presented. The secure data exchange is proposed between a laboratory and a patient and between a patient and Electronic Health Records. Advanced Encryption Standard was used to provide security of data encapsulated within a QR-code. The experimental setup, named labSeq is described....
-
Ship’s de-perming process using coils lying on seabed
PublikacjaA ship built from ferromagnetic steel disturbs the uniformity of the Earth’s magnetic field. Changes of ship’s signature are due to the magneto-mechanical interaction of the hull with the Earth’s magnetic field. The ship’s magnetic field can be detected by a magnetic naval mine. For this reason, the vessel has to be demagnetized. There are several methods of ship’s de-perming. The results of experimental and computer simulations...
-
Architecture and Basic Assumptions of RSMAD
PublikacjaThe study presents the architecture of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD) which is used for transmission (realized using GSM, UMTS or TETRA networks, and through the Internet network), archiving and exploring image data of traffic offenses. The paper also presents selected basic assumptions of the RSMAD system, which are relevant to the implemented by the system...
-
Semantic Integration of Heterogeneous Recognition Systems
PublikacjaComputer perception of real-life situations is performed using a variety of recognition techniques, including video-based computer vision, biometric systems, RFID devices and others. The proliferation of recognition modules enables development of complex systems by integration of existing components, analogously to the Service Oriented Architecture technology. In the paper, we propose a method that enables integration of information...
-
The experimental evaluation and modeling of SBR removing nutrients under varied aeration conditions
PublikacjaSequencing batch reactors (SBR) are mainly characterized by sequential process phases of fill, react, settle, decant and idle periods that allow considerable flexibility in the design and operation in different conditions. This flexibility and the unique features of SBRs used to wastewater treatment by activated sludge systems operated in laboratory scale, allow not only conducting experiments for the standard conditions but also...
-
Vitamin D signaling and melanoma: role of vitamin D and its receptors in melanoma progression and management
Publikacja -
Application of total parameters in environmental analytics
PublikacjaPrzedstawiono klasyfikację technik oznaczania tzw. parametrów sumarycznych w próbkach środowiskowych (powietrze, woda, gleba) oraz obszar wykorzystania parametrów sumarycznych w analityce środowiskowej.
-
From Linear Classifier to Convolutional Neural Network for Hand Pose Recognition
PublikacjaRecently gathered image datasets and the new capabilities of high-performance computing systems have allowed developing new artificial neural network models and training algorithms. Using the new machine learning models, computer vision tasks can be accomplished based on the raw values of image pixels instead of specific features. The principle of operation of deep neural networks resembles more and more what we believe to be happening...
-
Video Semantic Analysis Framework based on Run-time Production Rules - Towards Cognitive Vision
PublikacjaThis paper proposes a service-oriented architecture for video analysis which separates object detection from event recognition. Our aim is to introduce new tools to be considered in the pathway towards Cognitive Vision as a support for classical Computer Vision techniques that have been broadly used by the scientific community. In the article, we particularly focus in solving some of the reported scalability issues found in current...
-
Trust Management Method for Wireless Sensor Networks
PublikacjaA Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...
-
In Situ Verification of Numerical Model of Water Hammer in Slurries
PublikacjaThis paper presents a numerical model of transient flow in a pressure slurry pipeline network with verification based on in situ measurements. The model, primarily verified in laboratory conditions, has been extended and applied to the case of a large and complex slurry pipeline network in Poland. In the model, the equivalent density concept was applied. In situ experiments were performed for various unsteady flow episodes, caused by...
-
Serial control of CNC machines
PublikacjaIn this paper a new method of the serial control of CNC machines is proposed. Actuators are controlled locally and the role of the central computer is limited to sending commands to the controller instead of sending it directly to actuators. It has been achieved with the use of the serial protocol with the use of the USB port. The taken approach leads to more reliable operation because commands are buffered and no synchronization...
-
Identification of Bodner-Partom model parameters for technical fabrics
PublikacjaThe thorough analysis of modeling technical fabrics behavior with the viscoplastic Bodner-Partom constitutive law is presented. The study has been focused on differences between the warp and weft direction of the material. To obtain the model’s parameters only the uniaxial tensile laboratory tests with three different, but constant strain rates are required. The parameters have been found for polyester fibers PVC coated fabrics:...
-
Numerical Modelling of Structures with Uncertainties
PublikacjaThe nature of environmental interactions, as well as large dimensions and complex structure of marine offshore objects, make designing, building and operation of these objects a great challenge. This is the reason why a vast majority of investment cases of this type include structural analysis, performed using scaled laboratory models and complemented by extended computer simulations. The present paper focuses on FEM modelling...
-
Modeling sequencing batch reactor operational conditions depending on oxygen concentration
PublikacjaSequencing batch reactors (SBR) can be used as a fill-and draw activated sludge system for wastewater treatment with considerable operating flexibility and the possibility to conduct experiments under standard conditions and extreme case scenarios. Mathematical modeling and computer simulations provide an opportunity to implement existing wastewater processes in modeling software and evaluate different modifications at low costs...
-
Real-time hybrid model of a wind turbine with doubly fed induction generator
PublikacjaIn recent years renewable sources have been dominating power system. The share of wind power in energy production increases year by year, which meets the need to protect the environment. Possibility of conducting, not only computer simulation, but also laboratory studies of wind turbine operation and impact on the power system and other power devices in laboratory conditions would be very useful. This article presents a method...
-
The effect of current delay angle on tripping of residual current devices
PublikacjaPower electronics converters applied in domestic or similar installations may utilize current delay (phase) angle control to change the level of transferred power. Due to application of such types of converters, earth fault current in the installation may be strongly distorted. The current distortion level depends on a value of current delay angle. This delay angle also influences the tripping threshold of residual current devices....
-
Monte Carlo simulations of the fracture resistance degradation of asphalt concrete subjected to environmental factors
PublikacjaThe paper presents the results of laboratory tests of SCB (semi-circular beam) samples of asphalt concrete, subjected to the destructive effect of water and frost as well as the aging processes. The determined values of material parameters show significant dispersions, which makes the design of mixtures difficult. Statistical analysis of the test results supplemented by computer simulations made with the use of the proprietary...
-
Naval mine detection system based of FPGA circuit
PublikacjaElectrochemical processes take place in a metal object immersed into sea water even if an anticorrosive coating is applied [1]. As a result, flowing field appears around the object. There are naval mines between many other objects situated in the sea. Naval mines can be put in the seabed in order to be more difficult to detect by sonars. Such a mine is located on the line demarking two environments of different electrical conductivity....
-
A note on the affective computing systems and machines: a classification and appraisal
PublikacjaAffective computing (AfC) is a continuously growing multidisciplinary field, spanning areas from artificial intelligence, throughout engineering, psychology, education, cognitive science, to sociology. Therefore, many studies have been devoted to the aim of addressing numerous issues, regarding different facets of AfC solutions. However, there is a lack of classification of the AfC systems. This study aims to fill this gap by reviewing...
-
TECHNIKI CAD W INŻYNIERII ELEKTRYCZNEJ - WYBRANE ZAGADNIENIA
PublikacjaW pracy przedstawiono różne techniki CAD (ang. Computer Aided Design) wykorzystywane w inżynierii elektrycznej dla potrzeb komputerowego modelowania 3D przetworników elektromechanicznych. Wirtualne modele 3D różnych urządzeń są użyteczne nie tylko przy opracowywaniu dokumentacji technicznej ale są także wykorzystywane w obliczeniach inżynierskich:...
-
Secure access control and information protection mechanisms in radio system for monitoring and acquisition of data from traffic enforcement cameras
PublikacjaThe study presents the architecture of the Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short: RSMAD), particularly concerning access control and protection of confidential data. RSMAD security structure will be discussed in relation to network security issues. Additionally, the paper presents the results of the work associated with the modelling of potential threats to system security.
-
Integrating web site services into application through user interface
PublikacjaThe issue of integrating applications which are only accessible through visual user interface is not thoroughly researched. Integration of web applications running remotely and controlled by separate organizations becomes even more complicated, as their user interface can display differently in different browsers or change without prior notification as a result of application maintenance. While possible, it is generally not common...
-
Aiming at methods’ wider adoption: Applicability determinants and metrics
PublikacjaNumerous computer science methods and techniques have been proposed by the scientific community. However, depending on the domain, only their minor fraction has met wider adoption. This paper brings attention to the concept of applicability - the notion that is well acknowledged in the scientific field but have not been analysed with respect to determinants, metrics and systematisation. The primary objective of the study was to...
-
Application of computer assisted modified coupled mode method for the design of polarimetric sensors. Optical Fibres and Their Applications VIII. Białowieża 23-26 stycznia 2002. Ed. J. Dorosz, R.S. Romaniuk. Wykorzystanie zmodyfikowanej metody modów sprzężonych wspomaganej komputerem do projektowania sensorów polarymetrycznych.
PublikacjaW pracy przedstawiono rozszerzenie zmodyfikowanej metody modów sprzężonych,dzięki, któremu możliwe jest modelowanie szerokiej klasy światłowodów poddanych jednoczesnemu działaniu wielu zaburzeń. W metodzie tej dokonuje się numerycznego rozwiązania równania modów sprzężonych, w wyniku czego możliwa jest analiza przypadków, w których współczynniki sprzężenia modów nie są stałe wzdłuż światłowodu. W wyniku umiejętnej modyfikacji...
-
GROUP COMPOSER - System for Modeling Agents’ Team Building for Tasks
PublikacjaMulti-agent systems consist of many autonomous units, called agents, that can interact when trying to achieve their goals. The selection of interaction partners is called team formation. Three basic approaches can be considered to match multi-agent system resources to the problem at hand. To research the properties of different approaches, a software for modeling team formation in multi-agent systems has been created and is presented...
-
Multi-criteria Differential Evolution for Optimization of Virtual Machine Resources in Smart City Cloud
PublikacjaIn a smart city, artificial intelligence tools support citizens and urban services. From the user point of view, smart applications should bring computing to the edge of the cloud, closer to citizens with short latency. However, from the cloud designer point of view, the trade-off between cost, energy and time criteria requires the Pareto solutions. Therefore, the proposed multi-criteria differential evolution can optimize virtual...
-
Virtual Sightseeing in Immersive 3D Visualization Lab
PublikacjaThe paper describes the modern Immersive 3D Visualization Lab (I3DVL) established at the Faculty of Electronics, Telecommunications and Informatics of the Gdańsk University of Technology (GUT) and its potential to prepare virtual tours and architectural visualizations on the example of the application allowing a virtual walk through the Coal Market in Gdańsk. The paper presents devices of this laboratory (CAVE, walk simulator etc.),...
-
The Effectiveness of Basic Resuscitation Activities Carried out by Combat Paramedics of the Police, as Exemplified by Polish Counterterrorist Units
PublikacjaThe tasks carried out by Police officers are often accompanied by dangerous situations that threaten the life and health of the people involved, the police themselves, and bystanders. It concerns especially counter-terrorism police units whose activities are aimed at terrorists and particularly dangerous criminals, and their course is violent and aggressive. In conjunction with the inability to bring civilian rescue services into...
-
Evaluation of Professional Demands and Financial Reward Through the Perception of Police Managers
PublikacjaThe aim of the study was to examine the relationship between job demands and salary in the subjective perception of mid-level police managers. An occupational stress model in which effort spent on job demands are not balanced by the received reward, was adopted. The study comprised 51 police officers (4 women). The partial least squares method was used for the analysis, and the SmartPLS 2.0 program was applied. The income and...
-
Impact of Work on the Well-Being of Police Officers and Firefighters
PublikacjaWork is one of the most important spheres of human functioning and has a significant impact on individual overall well-being. The purpose of this study is to assess the positive and negative impact of the work of police officers and firefighters on their well-being in different spheres of life. In particular, the study examines the relationship between the type of occupation and the elements that generate a feeling of well-being,...
-
Psychosocial risks associated with the profession of train driver
PublikacjaExcellent competencies as well as a good physical and mental health are required in train drivers’ profession. Despite the changes in the structure of employment the train drivers above 46 years and job tenure longer than 30 years are the largest group. The generation gap is becoming more pronounced, and its fulfilment will not be easy. It is related not only to training of new personnel but also promotion of healthy work environment...
-
Identification of Emotional States Using Phantom Miro M310 Camera
PublikacjaThe purpose of this paper is to present the possibilities associated with the use of remote sensing methods in identifying human emotional states, and to present the results of the research conducted by the authors in this field. The studies presented involved the use of advanced image analysis to identify areas on the human face that change their activity along with emotional expression. Most of the research carried out in laboratories...
-
Review of Cybersecurity Assessment Methods: Applicability Perspective
PublikacjaCybersecurity assessments are crucial in building the assurance that vital cyberassets are effectively protected from threats. Multiple assessment methods have been proposed during the decades of the cybersecurity field. However, a systematic literature search described in this paper reveals that their reviews are practically missing. Thus, the primary objective of this research was to fulfil this gap by comprehensively identifying...
-
A Review of Standards with Cybersecurity Requirements for Smart Grid
PublikacjaAssuring cybersecurity of the smart grid is indispensable for the reliable operation of this new form of the electricity network. Experts agree that standardised solutions and practices should be applied in the first place. In recent years many new standards for smart grids have been published, which paradoxically results in the difficulty of finding a relevant publication in this plethora of literature. This paper presents results...
-
Clustering Context Items into User Trust Levels
PublikacjaAn innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy....
-
Rapid on-line method of wastewater parameters estimation by electronic nose for control and operating wastewater treatment plants toward Green Deal implementation
PublikacjaIn order to comply with legal regulations related to wastewater quality, the operational mode of facilities at wastewater treatment plant (WWTP) should be properly adjusted according to parameters of influents, however it is very difficult without frequently performed measurements. Currently there are known many techniques and devices for assesment of wastewater parameters such as chemical oxygen demand, biochemical oxygen demand,...
-
3D scanning system for railway current collector contact strips
PublikacjaUndisturbed collection of current from a contact wire of the catenary constitutes one of the basic elements in reliable operation of electrified rail transport, particularly when vehicles move at high speed. Quality of current collection is influenced by the construction of catenary and current collectors, as well as by the technical condition and regulation of these two elements. Total contact force of a current collector head...
-
Mathematical modelling of the overhead contact line for the purpose of diagnostics of pantographs
PublikacjaThe overhead contact line (OCL) is the most effective way for supplying railway electric vehicles. The increase of the speed of the vehicles increases power consumption and requires ensuring proper cooperation of pantographs with OCL. The paper describes the novel mathematical model of the OCL system and the simulation results. The primary objective is a more accurate analysis to increase the reliability of the evaluation of monitoring...
-
ADAPTIVE PREDICTIONS OF THE EURO/ZŁOTY CURRENCY EXCHANGE RATE USING STATE SPACE WAVELET NETWORKS AND FORECAST COMBINATIONS
PublikacjaThe paper considers the forecasting of the euro/Polish złoty (EUR/PLN) spot exchange rate by applying state space wavelet network and econometric forecast combination models. Both prediction methods are applied to produce one-trading-day- ahead forecasts of the EUR/PLN exchange rate. The paper presents the general state space wavelet network and forecast combination models as well as their underlying principles. The state space...
-
The maximum edge-disjoint paths problem in complete graphs
PublikacjaRozważono problem ścieżek krawędziowo rozłącznych w grafach pełnych. Zaproponowano wielomianowe algorytmy: 3.75-przybliżony (off-line) oraz 6.47-przybliżony (on-line), poprawiając tym samym wyniki wcześniej znane z literatury [P. Carmi, T. Erlebach, Y. Okamoto, Greedy edge-disjoint paths in complete graphs, in: Proc. 29th Workshop on Graph Theoretic Concepts in Computer Science, in: LNCS, vol. 2880, 2003, pp. 143-155]. Ponadto...
-
Emotion Monitor - Concept, Construction and Lessons Learned
PublikacjaThis paper concerns the design and physical construction of an emotion monitor stand for tracking human emotions in Human-Computer Interaction using multi-modal approach. The concept of the stand using cameras, behavioral analysis tools and a set of physiological sensors such as galvanic skin response, blood-volume pulse, temperature, breath and electromyography is presented and followed...
-
Supporting Gastroesophageal Reflux Disease Diagnostics by Using Wavelet Analysis in Esophageal pH-Metry
PublikacjaThis paper presents a new approach to computer supported esophageal pH-metry measurement analysis performed in order to diagnose gastroesophageal reflux disease. In this approach wavelet analysis was used to analyse the esophageal pH-metry course. The research was performed on three groups of pH-metry courses: whole 24-hour pH-metry course, sleep only pH-metry course and 20 minutes after the end of a meal pH-metry course. After...
-
Pursuing the Deep-Learning-Based Classification of Exposed and Imagined Colors from EEG
PublikacjaEEG-based brain-computer interfaces are systems aiming to integrate disabled people into their environments. Nevertheless, their control could not be intuitive or depend on an active external stimulator to generate the responses for interacting with it. Targeting the second issue, a novel paradigm is explored in this paper, which depends on a passive stimulus by measuring the EEG responses of a subject to the primary colors (red,...
-
THE INTERACTION BETWEEN STEEL COLUMN CHORD AND CLOSELY SPACED REINFORCEMENT.
PublikacjaNowadays, more often than before, civil engineering designers are willing to use steel build-up members composed of single or doubled cold-formed chords interconnected using different mechanical connectors. This paper subject is an analysis of cooperation of a closely spaced built-up cold-formed chord interconnected with series of bolts that are located along the length of the member in a specific spacing. This distance along the...
-
Human Feedback and Knowledge Discovery: Towards Cognitive Systems Optimization
PublikacjaCurrent computer vision systems, especially those using machine learning techniques are data-hungry and frequently only perform well when dealing with patterns they have seen before. As an alternative, cognitive systems have become a focus of attention for applications that involve complex visual scenes, and in which conditions may vary. In theory, cognitive applications uses current machine learning algorithms, such as deep learning,...
-
The methods of secure data transmission in the KNX system
PublikacjaThe article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.
-
Multiple sound sources localization in real time using acoustic vector sensor
PublikacjaMethod and preliminary results of multiple sound sources localization in real time using the acoustic vector sensor were presented in this study. Direction of arrival (DOA) for considered source was determined based on sound intensity method supported by Fourier analysis. Obtained spectrum components for considered signal allowed to determine the DOA value for the particular frequency independently. The accuracy of the developed...