Filtry
wszystkich: 4082
wybranych: 2450
-
Katalog
- Publikacje 2450 wyników po odfiltrowaniu
- Czasopisma 369 wyników po odfiltrowaniu
- Konferencje 202 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 314 wyników po odfiltrowaniu
- Projekty 14 wyników po odfiltrowaniu
- Laboratoria 1 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Aparatura Badawcza 1 wyników po odfiltrowaniu
- Kursy Online 168 wyników po odfiltrowaniu
- Wydarzenia 6 wyników po odfiltrowaniu
- Dane Badawcze 555 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: COMPUTER SECURITY LABORATORY
-
Automated Classifier Development Process for Recognizing Book Pages from Video Frames
PublikacjaOne of the latest developments made by publishing companies is introducing mixed and augmented reality to their printed media (e.g. to produce augmented books). An important computer vision problem that they are facing is classification of book pages from video frames. The problem is non-trivial, especially considering that typical training data is limited to only one digital original per book page, while the trained classifier...
-
Tensor Decomposition for Imagined Speech Discrimination in EEG
PublikacjaMost of the researches in Electroencephalogram(EEG)-based Brain-Computer Interfaces (BCI) are focused on the use of motor imagery. As an attempt to improve the control of these interfaces, the use of language instead of movement has been recently explored, in the form of imagined speech. This work aims for the discrimination of imagined words in electroencephalogram signals. For this purpose, the analysis of multiple variables...
-
Modelling of Different Aeration Modes Influencing Processes in SBR Bioreactor
PublikacjaCurrently, computer modelling together with the simulation tools tailored for that purpose constitute a very important element in planning technological changes within wastewater treatment plant. From the point of view of the WWTP operator every modification should be introduced in order to improve the quality of treated sewage with the lowest financial outlays. These requirements can be met by using computer programmes to effectuate...
-
Modeling energy consumption of parallel applications
PublikacjaThe paper presents modeling and simulation of energy consumption of two types of parallel applications: geometric Single Program Multiple Data (SPMD) and divide-and-conquer (DAC). Simulation is performed in a new MERPSYS environment. Model of an application uses the Java language with extension representing message exchange between processes working in parallel. Simulation is performed by running threads representing distinct process...
-
Theory and implementation of a virtualisation level Future Internet defence in depth architecture
PublikacjaAn EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...
-
Validation of a virtual test environment for C2X communication under radio jamming conditions
PublikacjaIn this paper, we propose a novel car-2-x communication security testing methodology in the physical layer of wireless systems. The approach is dedicated to automated testing of autonomous vehicles and it is essential for such complex systems operation, especially with regard to safety and security issues. It is based on scenario-driven testing in virtual and real test environments created from collected or simulated data. The...
-
Modeling the Effects of Slowly Biodegradable Substrate at Large WWTP in Northern Poland
PublikacjaThe essential study was divided into two parts: experimental investigation and mathematical modeling using special platform to computer simulations. In the first part of research an innovative measurement procedure for an indirect determination of the effect of biodegradable particulate and colloidal Xs substrate was developed and implemented. The results of laboratory tests were used futher to verify the mechanism of the hydrolysis...
-
The Influence of the Chemical Composition of Selected Waste Materials from the Production of Copper on the Final Environmental Assessment
PublikacjaThis article presents qualitative and quantitative analysis of the waste produced by KGHM Polska Miedź. The waste has been analyzed according to its chemical composition and balanced in order to be reused and recycled. Special attention has been paid to mining industries producing the biggest amount of waste and ore enrichment businesses generating waste, which isn’t reused nowadays. Laboratory reseach has been conducted on floatation...
-
Path integrals formulations leading to propagator evaluation for coupled linear physics in large geometric models
PublikacjaReformulating linear physics using second kind Fredholm equations is very standard practice. One of the straightforward consequences is that the resulting integrals can be expanded (when the Neumann expansion converges) and probabilized, leading to path statistics and Monte Carlo estimations. An essential feature of these algorithms is that they also allow to estimate propagators for all types of sources, including initial conditions....
-
Mechanizmy bezpieczeństwa transmisji w systemie netBaltic
Publikacjaartykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Architektura bezpieczeństwa systemu netBaltic
PublikacjaW artykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Feature extraction in detection and recognition of graphical objects
PublikacjaDetection and recognition of graphic objects in images are of great and growing importance in many areas, such as medical and industrial diagnostics, control systems in automation and robotics, or various types of security systems, including biometric security systems related to the recognition of the face or iris of the eye. In addition, there are all systems that facilitate the personal life of the blind people, visually impaired...
-
Applicability of Emotion Recognition and Induction Methods to Study the Behavior of Programmers
PublikacjaRecent studies in the field of software engineering have shown that positive emotions can increase and negative emotions decrease the productivity of programmers. In the field of affective computing, many methods and tools to recognize the emotions of computer users were proposed. However, it has not been verified yet which of them can be used to monitor the emotional states of software developers. The paper describes a study carried...
-
Kontekstowo zorientowany model bezpieczeństwa systemów internetowych
PublikacjaW rozprawie dokonano analizy usługowych systemów internetowych pod względem bezpieczeństwa. Przedstawiono autorskie uniwersalne modele bezpieczeństwa CoRBAC oraz jego rozszerzenie TCoRBAC, będące rozwinięciem tradycyjnego modelu RBAC. Uwzględniono analizę szeroko rozumianego kontekstu funkcjonowania systemu oraz poziom jego zaufania do użytkownika. Opracowano metodę wyznaczania dwóch parametrów: zaufania do systemu (λ) będącego...
-
Combining markers of nephrotoxicity and hepatotoxicity for improved monitoring and detection of chronic alcohol abuse
Publikacja -
Stickstoffbilanz bei Patienten nach laparoskopischer Cholezystektomie
Publikacja -
Use of MAG1 recombinant antigen for diagnosis of Toxoplasma gondii infection in humans
PublikacjaPraca opisuje klonowanie, oczyszczanie oraz zastosowanie w immunodiagnostyce toksoplazmozy antygenu rekombinantowego macierzy cyst tkankowych (MAG1) Toxoplasma gondii. Zastosowany system ekspresyjny pozwolił uzyskać dużą ilość rekombinantowego antygenu, który następnie wykorzystano w teście ELISA do wykrywania specyficzych przeciwciał anty-T. gondii klasy IgG w surowicach pacjentów chorych na toksoplazmozę. W przeprowadzonych badaniach...
-
Simulating Malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
New RFID readers for scalable RFID system
PublikacjaRFID systems gives the opportunity to have wide access control integrated with the monitoring of people and goods flow. System's scalability is one of the most important features in such systems as they enable large scale deployments. The concept of the proposed reader's architecture employs new RFID transceivers and microcontrollers, security algorithms which gives very high functionality at low price. Special treatment of system's...
-
The symmetric extendibility of quantum states
PublikacjaStudies on the symmetric extendibility of quantum states have become particularly important in the context of the analysis of one-way quantum measures of entanglement, and the distillability and security of quantum protocols. In this paper we analyze composite systems containing a symmetric extendible part, with particular attention devoted to the one-way security of such systems. Further, we introduce a new one-way entanglement...
-
Mechanizmy bezpieczeństwa w strefie C systemu netBaltic
PublikacjaW artykule zaprezentowano rozwiązania zaimplementowane do zabezpieczania komunikacji w warunkach sporadycznej i nieciągłej łączności (Delay Tolerant Networking – DTN) w systemie netBaltic - charakterystycznej dla strefy C tego systemu. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych, architektura bezpieczeństwa całego systemu została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI),...
-
Threat/risk assessment tool to assess vulnerability of Polish cities to Russian attacks
Publikacja -
WIKI-WS as a C2 NIWA Web Service Management Platform
PublikacjaThe Wiki-WS platform was implemented within the C2 NIWA project for production purposes. Wiki-WS stands for developing, managing and maintaining web services. The production deployment needed implementation of several functional improvements and establishing a strong security 7 safety policy. The WikiWS platform has to be used as an educational environmement for developing web sevices and production environment for execution of...
-
Evaluation and behaviour of slowly biodegradable substrate on mathematical modelling of oxygen uptake rate in activated sludge systems
PublikacjaThe effect of the readily biodegradable (Ss) fraction in activated sludge systems has been extensively investigated, but only minor information can be found about the effect of Xs on OUR in activated sludge systems. The aim of this study was to determine the evaluation and behaviour of Xs on mathematical modelling of OUR using ASM2d and its modification. The essential study was divided into two major parts: experimental investigation...
-
Adaptive Algorithm of a Tap-Changer Controller of the Power Transformer Supplying the Radial Network Reducing the Risk of Voltage Collapse
Publikacjahe development of renewable energy, including wind farms, photovoltaic farms as well as prosumer installations, and the development of electromobility pose new challenges for network operators. The results of these changes are, among others, the change of network load profiles and load flows determining greater volatility of voltages. Most of the proposed solutions do not assume a change of the transformer regulator algorithm....
-
AUTONOMOUS PLATFORM TO PROTECT MARITIME INFRASTRUCTURE FACILITIES
PublikacjaProblems regarding the security of maritime infrastructure, especially harbours and offshore infrastructure, are currently a very hot topic. Due to these problems, there are some research projects in which the main goal is to decrease the gap and improve the methods of observation in the chosen area, for both in-air and underwater areas. The main goal of the paper is to show a new complex system for improving the security of the...
-
Verification of the criteria for evaluation of water and frost resistance of asphalt concrete
PublikacjaThe paper presents the results of field investigation - condition survey of existing pavements and the results of laboratory tests on water and frost resistance of samples cored from the these pavements. The purpose of testing was to verify the criteria for evaluation of the resistance of asphalt concrete to the action of water and frost by way of comparing the results of field and laboratory tests, followed by evaluation of their...
-
Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment
PublikacjaThe smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...
-
Signatures and acoustic images of objects moving in water
PublikacjaObservation of underwater space is part of a generaltrend, which primary purpose is to protect and increasesafety in the selected area. The basic aim of the paper ispresentation of designated acoustic characteristics typicalfor objects moving on the water surface and under water,which represent some knowledge about detection of theseobjects. Create a catalog of acoustic signature and not onlyacoustic, as well as acoustic images...
-
A Special Section on Intelligent User Interfaces in Healthcare (IUIH)
PublikacjaA concept of interface has evolved from the first appearance in the form of a command line interface to the established use of direct manipulation or WIMP (windows, icons, menus and pointing) interfaces in nearly all applications. Intelligent user interfaces (IUI) form a subfield of Human-Computer Interaction research. Optimal human-computer interactions are defined as ones where users are able to perform complex tasks more quickly...
-
DevEmo—Software Developers’ Facial Expression Dataset
PublikacjaThe COVID-19 pandemic has increased the relevance of remote activities and digital tools for education, work, and other aspects of daily life. This reality has highlighted the need for emotion recognition technology to better understand the emotions of computer users and provide support in remote environments. Emotion recognition can play a critical role in improving the remote experience and ensuring that individuals are able...
-
Network-aware Data Prefetching Optimization of Computations in a Heterogeneous HPC Framework
PublikacjaRapid development of diverse computer architectures and hardware accelerators caused that designing parallel systems faces new problems resulting from their heterogeneity. Our implementation of a parallel system called KernelHive allows to efficiently run applications in a heterogeneous environment consisting of multiple collections of nodes with different types of computing devices. The execution engine of the system is open for...
-
THE EFFECT OF NOTCH DEPTH ON CTOD VALUES IN FRACTURE TESTS OF STRUCTURAL STEEL ELEMENTS
PublikacjaIn elements of steel structures working at low temperatures, there is a risk of appearance of brittle fracture. This risk is reduced through the use of certified materials having guaranteed strength at a given temperature. A method which is most frequently used to determine brittle fracture toughness is the Charpy impact test, preformed for a given temperature. For offshore structures intended to work in the arctic climat e, the...
-
PLC-based Implementation of Stochastic Optimization Method in the Form of Evolutionary Strategies for PID, LQR, and MPC Control
PublikacjaProgrammable logic controllers (PLCs) are usually equipped with only basic direct control algorithms like proportional-integral-derivative (PID). Modules included in engineering software running on a personal computer (PC) are usually used to tune controllers. In this article, an alternative approach is considered, i.e. the development of a stochastic optimizer based on the (μ,λ) evolution strategy (ES) in a PLC. For this purpose,...
-
Prof. Haitham Abu-Rub - A Visit to Poland's Gdansk University of Technology
PublikacjaReport on visit of Prof. Haitham Abu-Rub in Gdansk University of Technology. Speech on the Smart Grid Centre. Visit in the new smart grid laboratory of the GUT, the Laboratory for Innovative Power Technologies and Integration of Renewable Energy Sources (LINTE^2).
-
Wyzwania bezpieczeństwa nowoczesnych platform nauczania zdalnego
PublikacjaW artykule zaprezentowano aspekty bezpieczeństwa nowoczesnych platform nauczania zdalnego. Przedstawiono ich charakterystykę i wyzwania technologiczne. Zdefiniowano bezpieczeństwo i istniejące w tym obszarze zagrożenia. Przybliżono metody oceny poziomu bezpieczeństwa. Na bazie wdrożonej na Politechnice Gdańskiej platformy eNauczanie PG omówiono sposoby zapewniania zakładanego poziomu bezpieczeństwa takich systemów.
-
Hip endhoprothesis development using rapid prototyping methods
PublikacjaIntegrated product development based on Rapid Prototyping methods, connected with computer aided 3D design and computer aided engineering enables fast and full new product verification and validation. A case study derived from clinical and technological practice using hip implant construction is also included.
-
ENISA Study: Challenges in Securing Industrial Control Systems
PublikacjaIn 2011, the European Network and Information Security Agency (ENISA) conducted a study in the domain of Industrial Control Systems (ICS). Its objective was to obtain the current view on the ICS protectionprimarily in Europe but also in the international context. The portrait' included threats, risks, and challenges in the area of ICS protection as well as national, pan European, and international initiatives on ICS security. The...
-
Device-independent quantum key distribution based on measurement inputs
PublikacjaWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
Facilitating free travel in the Schengen area—A position paper by the European Association for Biometrics
PublikacjaDue to migration, terror-threats and the viral pandemic, various EU member states have re-established internal border control or even closed their borders. European Association for Biometrics (EAB), a non-profit organisation, solicited the views of its members on ways which biometric technologies and services may be used to help with re-establishing open borders within the Schengen area while at the same time mitigating any adverse...
-
INTEGRATED FUNCTIONAL SAFETY AND CYBERSECURITY ANALYSIS METHOD FOR SMART MANUFACTURING SYSTEMS
PublikacjaThis article addresses integrated functional safety and cybersecurity analysis with regard to: the generic functional safety standard IEC 61508 and the cyber security standard IEC 62443 concerning an industrial automation and control system (IACS). The objective is to mitigate the vulnerability of information technology (IT) and operational technology (OT) systems, and reduce relevant risks taking into account a set of fundamental...
-
Modelling of sequencing batch reactor operating at various aeration modes
PublikacjaThe presented study involved designing a computer model of a sequencing batch reactor (SBR) at laboratory scale. The data pertaining to the technical aspects of the bioreactor and quality indicators of wastewater constituted the input for the employed simulation tool, i.e. GPS-X software package. The results of a simulation involving a 12-hour operation cycle are presented in this work; each cycle included 6 phases: filling, mixing,...
-
Usability Testing of Mobile Applications: A Methodological Framework
PublikacjaLess than five percent of all mobile applications have become successful throughout 2023. The success of a new mobile application depends on a variety of factors ranging from business understanding, customer value, and perceived quality of use. In this sense, the topic of usability testing of mobile applications is relevant from the point of view of user satisfaction and acceptance. However, the current knowledge seems to be fragmented,...
-
Application of TMS320c67xx signal processors for SONIC-self-optimizing narrowband interference canceler
PublikacjaThe paper presents a laboratory system for testing active control algorithms of acoustics noise in ducts. An applied algorithm - self-optimizing narrowband interference canceller (SONIC), allows one to remove narrowband disturbances of constant or slowly time-varying frequencies. Example experimental results of using the laboratory system for supression of sinusoidal disturbance are described. An electronic part of the system was...
-
Choosing the Right Cybersecurity Solution: A Review of Selection and Evaluation Criteria
PublikacjaInformation technologies evolve continuously reaching pioneering areas that bring in new cybersecurity challenges. Security engineering needs to keep pace with the advancing cyberthreats by providing innovative solutions. At the same time, the foundations that include security and risk assessment methodologies should remain stable. Experts are offered with an extensive portfolio of solutions and an informed choice of a particular...
-
Eye-tracking everywhere - software supporting disabled people in interaction with computers
PublikacjaIn this paper we present comprehensive system for communication with computer by gaze. One of the main assumptions behind this work was to provide solution that can be used with standard RGB webcam. The proposed comprehensive system included the eye tracking module and user interface for convenient gaze interaction with computer. As a result a fully functional application was developed. The average accuracy of the eye tracking...
-
Virtual touchpad - video-based multimodal interface
PublikacjaA new computer interface named Virtual-Touchpad (VTP) is presented. The Virtual-Touchpad provides a multimodal interface which enables controlling computer applications by hand gestures captured with a typical webcam. The video stream is processed in the software layer of the interface. Hitherto existing video-based interfaces analyzing frames of hand gestures are presented. Then, the hardware configuration and software features...
-
Tick-borne encephalitis – lipid peroxidation and its consequences
Publikacja -
ALIS-FLP: amplified ligation selected fragment-length polymorphism method for microbial genotyping
PublikacjaA DNA fingerprinting method known as ALIS-FLP (amplified ligation selected fragment-length polymorphism) has been developed for selective and specific amplification of restriction fragments from TspRI restriction endonuclease digested genomic DNA. The method is similar to AFLP, but differs in that only one specific restriction enzyme (TspRI) is used. The cohesive ends of the DNA fragments are ligated with two types of oligonucleotide....
-
Arterial stiffness, body fat compartments, central hemodynamics, renal function and left atrial size
Publikacja