Filtry
wszystkich: 2706
wybranych: 1602
-
Katalog
- Publikacje 1602 wyników po odfiltrowaniu
- Czasopisma 106 wyników po odfiltrowaniu
- Konferencje 80 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 33 wyników po odfiltrowaniu
- Projekty 13 wyników po odfiltrowaniu
- Kursy Online 34 wyników po odfiltrowaniu
- Wydarzenia 1 wyników po odfiltrowaniu
- Dane Badawcze 836 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: IOT SECURITY FEATURES
-
Applying Generative Modelling Tools to Explore Architectural Forms
PublikacjaThe digital generative methods open up new areas for exploration of formal and tectonic features, accentuate form’s ability to emerge and perform. They allow for automatic generation of variations of solutions, and digital production of “difficult” components of architectural forms using CNC technology.The paper deals with contemporary architectural explorations of complex , curvilinear surfaces in the context of generative...
-
Parametrization and Correlation Analysis Applied to Music Mood Classification .
PublikacjaThe paper presents a study on music mood categorization. First, a review of music mood models is presented. Then, the preparation of a set of music excerpts to be used in the experiments and music parametrization is described. Next, some listening tasks performed to obtain mood descriptors are introduced. Finally,the correlation between mood descriptors and features extracted from parameters is discussed. The paper concludes with...
-
Birch sap concentrate as a potential modern food product
PublikacjaThis paper presents birch sap concentrate obtained by the reverse osmosis method. It is characterized by sweet taste, high content of minerals and no risk to consumers in terms of content of heavy metals standardized in the European Union food legislation. This beverage has all the features of a modern food product, i.e. it has an attractive taste, is obtained using new technology, meets the clean label requirements and can be...
-
Realistic noise-tolerant randomness amplification using finite number of devices
PublikacjaRandomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...
-
Concept of Multifactor Method and Non-Functional Requirements Solution to Increase Resilience through Functional Safety with Cybersecurity Analysis
PublikacjaIn the process of designing safety systems, an integrated approach in safety and cybersecurity analysis is necessary. The paper describes a new technique of increasing resilience through integrated analysis of functional safety and cybersecurity. It is a modeling methodology based on the combination of the multifactor method utilizing modified risk graphs, used previously for Safety Integrity Level (SIL) assessment, and the Non-Functional...
-
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublikacjaAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
Towards the value-based design of on-line services
PublikacjaThe paper identifies economic factors shaping customer bahaviour in on-line services in two interrelated dimensions; (1) economic needs and requirements, relevant to expected benefits and values perceived by customers; (2) technical components, allowing technical realization of on-line services. Technical components were cathegorized into four groups, creating so-called VIPR model: Visual, Interactive, Process and Relationship-relevant...
-
Resolving conflicts in object tracking for automatic detection of events in video
PublikacjaW referacie przedstawiono algorytm rozwiązywania konfliktów w śledzeniu obiektów ruchomych. Proponowana metoda wykorzystuje predykcję stanu obiektu obliczaną przez filtry Kalmana oraz dopasowuje wykryte obiekty do struktur śledzących ich ruch na podstawie deskryptorów koloru i tekstury. Omówiono specyficzne sytuacje powodujące konflikty, takie jak rozdzielanie obiektów. Przedstawiono wyniki testów. Algorytm może być zastosowany...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublikacjaFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
Hazardous material-related propagation of the effects of train accidents in the subgrade
PublikacjaA large part of the transport of hazardous materials is carried out by rail. Therefore, the security of these transports is becoming increasingly important. Every catastrophe involving dangerous materials has a negative impact on the participants of the incident and the surrounding environment, because its range is generally not local. It follows that in the event of a catastrophe, its effects should be minimized and remediation...
-
Trustworthy Applications of ML Algorithms in Medicine - Discussion and Preliminary Results for a Problem of Small Vessels Disease Diagnosis.
PublikacjaML algorithms are very effective tools for medical data analyzing, especially at image recognition. Although they cannot be considered as a stand-alone diagnostic tool, because it is a black-box, it can certainly be a medical support that minimize negative effect of human-factors. In high-risk domains, not only the correct diagnosis is important, but also the reasoning behind it. Therefore, it is important to focus on trustworthiness...
-
EXAMINING INFLUENCE OF VIDEO FRAMERATE AND AUDIO/VIDEO SYNCHRONIZATION ON AUDIO-VISUAL SPEECH RECOGNITION ACCURACY
PublikacjaThe problem of video framerate and audio/video synchronization in audio-visual speech recognition is considered. The visual features are added to the acoustic parameters in order to improve the accuracy of speech recognition in noisy conditions. The Mel-Frequency Cepstral Coefficients are used on the acoustic side whereas Active Appearance Model features are extracted from the image. The feature fusion approach is employed. The...
-
EXAMINING INFLUENCE OF VIDEO FRAMERATE AND AUDIO/VIDEO SYNCHRONIZATION ON AUDIO-VISUAL SPEECH RECOGNITION ACCURACY
PublikacjaThe problem of video framerate and audio/video synchronization in audio-visual speech recogni-tion is considered. The visual features are added to the acoustic parameters in order to improve the accuracy of speech recognition in noisy conditions. The Mel-Frequency Cepstral Coefficients are used on the acoustic side whereas Active Appearance Model features are extracted from the image. The feature fusion approach is employed. The...
-
3D MODELLING OF CYLINDRICAL-SHAPED OBJECTS FROM LIDAR DATA - AN ASSESSMENT BASED ON THEORETICAL MODELLING AND EXPERIMENTAL DATA
PublikacjaDespite the increasing availability of measured laser scanning data and their widespread use, there is still the problem of rapid and correct numerical interpretation of results. This is due to the large number of observations that carry similar information. Therefore, it is necessary to extract from the results only the essential features of the modelled objects. Usually, it is based on a process using filtration, followed by...
-
Sustainable Investing. Socio-Economic Impacts of Exchange-Traded Funds
PublikacjaSustainable Investing: Socio-Economic Impacts of Exchange-Traded Funds examines the social and economic effects of sustainable investing ETFs and their impacts on the global financial system. The book presents the key issues with regard to sustainable investing, discussing exchange-traded funds mechanisms and categories in comparison to competing investment funds. The book outlines the theoretical determinants of ETF markets development...
-
Improvement of speech intelligibility in the presence of noise interference using the Lombard effect and an automatic noise interference profiling based on deep learning
PublikacjaThe Lombard effect is a phenomenon that results in speech intelligibility improvement when applied to noise. There are many distinctive features of Lombard speech that were recalled in this dissertation. This work proposes the creation of a system capable of improving speech quality and intelligibility in real-time measured by objective metrics and subjective tests. This system consists of three main components: speech type detection,...
-
Age Prediction from Low Resolution, Dual-Energy X-ray Images Using Convolutional Neural Networks
PublikacjaAge prediction from X-rays is an interesting research topic important for clinical applications such as biological maturity assessment. It is also useful in many other practical applications, including sports or forensic investigations for age verification purposes. Research on these issues is usually carried out using high-resolution X-ray scans of parts of the body, such as images of the hands or images of the chest. In this...
-
Embedded gas sensing setup for air samples analysis
PublikacjaThis paper describes a measurement setup (eNose) designed to analyze air samples containing various volatile organic compounds (VOCs). The setup utilizes a set of resistive gas sensors of divergent gas selectivity and sensitivity. Some of the applied sensors are commercially available and were proposed recently to reduce their consumed energy. The sensors detect various VOCs at sensitivities determined by metal oxide sensors’ technology...
-
Influence of span length and impulse front time on earthing measurement accuracy of power line towers
PublikacjaThe article discusses the issue of measuring and assessing the features of power line tower earthings using fast-changing waveform. The study analyses the effect of impulse front time and the line span length on errors made during these measurements using impulse meters. It has been found that the assessment conditions similar to the static measurement results occur for the use of 4 μs current impulses and such procedure is useful...
-
Dangerous sound event recognition using Support Vector Machine classifiers
PublikacjaA method of recognizing events connected to danger based on their acoustic representation through Support Vector Machine classification is presented. The method proposed is particularly useful in an automatic surveillance system. The set of 28 parameters used in the classifier consists of dedicated parameters and MPEG-7 features. Methods for parameter calculation are presented, as well as a design of SVM model used for classification....
-
The use of innovative application in creating new marketing space for cultural and entertainment events in the local market
PublikacjaThe following article describes the problems concerning marketing of mass events in the local market and potential solutions. In the first part the barriers that occur in communication between the organizers and the articipants are defined. In the process of identifying problems the results of research conducted for the needs article were used. In following sections the solution with use of Smartphone app is shown. The features that...
-
A dipole-driven path for electron and positron attachments to gas-phase uracil and pyrimidine molecules: a quantum scattering analysis
PublikacjaElectron and positron scattering processes in the gas-phase are analysed for uracil and pyrimidine molecules using a multichannel quantum approach at energies close to threshold. The special effects on the scattering dynamics induced by the large dipole moments in both molecules on the spatial features of the continuum leptonic wavefunctions are here linked to the possible bound states of the Rydberg-like molecular anions or ‘positroned’...
-
BENEFITS FROM BREAKING UP WITH LINUX NATIVE PACKET PROCESSING WHILE USING INTEL DPDK LIBRARIES
PublikacjaThe Intel Data Plane Development Kit (DPDK) is a set of libraries and drivers for fast packet processing in Linux. It is a dedicated framework for building efficient high-speed data plane applications supporting QoS features with poll mode drivers which are supporting virtual and physical NIC’s so environment can be used to build efficient data plane applications for packet networks. The results of test on Quality of Service Metering...
-
The International Mercury Cartel, 1928–1954: Controlling Global Supply
PublikacjaThis article describes the features of the international mercury marketduringthe firsthalfofthetwentiethcentury.Itanalyzes the various market agreements made, their effectiveness, and their consequences. The period studied is little understood, although it was one in which mercury production greatly increased. It was also one that saw persistent efforts at market manipulation, owing to a series of agreements between Spanish and...
-
Analysis and characterization of coordination compounds by resonance Raman spectroscopy
PublikacjaResonance Raman spectroscopy has become a powerful tool to study excited-state geometries, excited-state charge distributions and photoinduced reaction dynamics in coordination compounds. Due to their rich photophysical properties coordination compounds are utilized for a variety of applications ranging from DNA sensing to photocatalysis. This review features recent applications of various resonance Raman scattering techniques...
-
Mechanizmy komunikacji w rozproszonych systemach specjalnego przeznaczenia
PublikacjaZadania ochrony i bezpieczeństwa granic państwa realizowane przez Straż Graniczną wymagają wsparcia ze strony nowoczesnych systemów Technologii Informacyjnych (TI) uwarunkowanych ich specjalnym przeznaczeniem. Z uwagi na charakter tej służby, rozwiązania dla jej potrzeb muszą być realizowane jako systemy rozproszone umożliwiające przenoszenie i przetwarzanie informacji głosowych oraz różnorodnych danych, w tym specjalnego przeznaczenia....
-
Automatyczna weryfikacja klienta bankowego w oparciu o multimodalne technologie biometryczne
PublikacjaW referacie przedstawiono przegląd rozwiązań wykorzystywanych w bankach do weryfikacji tożsamości klientów. Ponadto zawarto opis metod biometrycznych aktualnie wykorzystywanych w placówkach bankowych wraz z odniesieniem do skuteczności i wygody korzystania z dostępnych rozwiązań. Zaproponowano rozszerzenie zakresu wykorzystania technologii biometrycznych, wskazując kierunek rozwoju systemów bezpieczeństwa dla poprawy dostępu do...
-
Powering the Future by Iron Sulfide Type Material (FexSy) Based Electrochemical Materials for Water Splitting and Energy Storage Applications: A Review
PublikacjaWater electrolysis is among the recent alternatives for generating clean fuels (hydrogen). It is an efficient way to produce pure hydrogen at a rapid pace with no unwanted by-products. Effective and cheap water-splitting electrocatalysts with enhanced activity, specificity, and stability are currently widely studied. In this regard, noble metal-free transition metal-based catalysts are of high interest. Iron sulfide (FeS) is one...
-
Client-side versus server-side geographic data processing performance comparison: Data and code
PublikacjaThe data and code presented in this article are related to the research article entitled “Analysis of Server-side and Client-side Web-GIS data processing methods on the example of JTS and JSTS using open data from OSM and Geoportal” (Kulawiak et al., 2019). The provided 12 datasets include multi-point and multi-polygon data of different scales and volumes, representing real-world geographic features. The datasets cover the area...
-
Mechanical Performance and Environmental Assessment of Sustainable Concrete Reinforced with Recycled End-of-Life Tyre Fibres
PublikacjaThe presented research’s main objective was to develop the solution to the global problem of using steel waste obtained during rubber recovery during the tire recycling. A detailed comparative analysis of mechanical and physical features of the concrete composite with the addition of recycled steel fibres (RSF) in relation to the steel fibre concrete commonly used for industrial floors was conducted. A study was carried out using...
-
Gas turbines – technological development and potential use in CAES systems
PublikacjaThis article briefly describes Compressed Air Energy Storage (CAES), focusing on the technological development of one of the key elements of such systems – the gas turbines. It presents the basic parameters and features of gas turbines, as well as turbine classes with example models. Main tendencies in the structural and technological development are discussed. Changes and trends on electric energy markets are becoming more and...
-
Advanced surveillance and operational communication system employing mobile terminals
PublikacjaDistributed surveillance and operational communications system based on XMPP protocol is presented. Its architecture and assumptions leading to the depicted design are shown. Features of XMPP protocol are portrayed with the emphasis on those most important in the context of the application. Real-time multimedia transmission with the use of Jingle/XMPP extension is discussed. The use of PDA-class computers as mobile terminals is...
-
Information Logistics as a Paradigm
PublikacjaThis paper presents a paradigm-based approach to information logistics. The approach deals with extracting concepts specific to information logistics in categories typical to paradigms. The resulting description should be easily connected to complementary components which are based on other paradigms, e.g. business process management and information systems development. Empirical part aims at checking and enhancing features typical...
-
Implementation of integrated control In drinking water distribution systems - IT system proposal
PublikacjaImplementation of integrated control algorithms requires suitable hardware and software platforms. Proposed solution must allow realizing control and monitoring tasks, while ensuring high reliability and security of processed data. Additionally, the software and hardware solutions must be immune to outside influence. This paper presents an approach to implementation of control systems in drinking water distribution system. Presented...
-
Analysis of hydrodynamic pressure fields of motorboats and pontoons in shallow water
PublikacjaThe article presents the results of calculations of the pressure fields generated by a motorboat at the bottom of a shallow sea. Calculations were made using the boundary elements method (BEM), arranged on the surface of the boat and the bottom of the sea. This method is described in [3], and applied on a free surface linearized boundary condition. Results for four different lengths of motorboats, from 2.85 m to 9.5 m, sea depth...
-
Federated Learning in Healthcare Industry: Mammography Case Study
PublikacjaThe paper focuses on the role of federated learning in a healthcare environment. The experimental setup involved different healthcare providers, each with their datasets. A comparison was made between training a deep learning model using traditional methods, where all the data is stored in one place, and using federated learning, where the data is distributed among the workers. The experiment aimed to identify possible challenges...
-
Efficient removal of 2,4,6-trinitrotoluene (TNT) from industrial/military wastewater using anodic oxidation on boron-doped diamond electrodes
PublikacjaWith growing public concern about water quality particular focus should be placed on organic micropollutants, which are harmful to the environment and people. Hence, the objective of this research is to enhance the security and resilience of water resources by developing an efficient system for reclaiming industrial/military wastewater and protecting recipients from the toxic and cancerogenic explosive compound – 2,4,6-trinitrotoluene...
-
Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej – wymagania i kryteria
PublikacjaNiniejsza praca poświęcona jest zagadnieniom zarządzania bezpieczeństwem funkcjonalnym w cyklu życia z uwzględnieniem norm międzynarodowych PN-ENIEC 61508 i PN-ENIEC 61511 oraz zarządzaniu bezpieczeństwem informacji w systemach i sieciach komputerowych w nawiązaniu do wytycznych OECD i wymagań normy PN-ISO/IEC 27001. Rozważa się przykłady skupionych i rozproszonych sieci komputerowych pełniących funkcje monitorowania, sterowania...
-
Comparison of state feedback and PID control of pressurizer water level in nuclear power plant
PublikacjaThe pressurizer water level control system in nuclear power plant with pressurized water reactor (PWR) is responsible for coolant mass balance. The main control goal is to stabilize the water level at a reference value and to suppress the effect of time-varying disturbances (e.g. coolant leakage in primary circuit pipeline system). In the process of PWR power plant operation incorrect water level may disturb pressure control or...
-
Multimodal Surveillance Based Personal Protection System
PublikacjaA novel, multimodal approach for automatic detection of abduction of a protected individual, employing dedicated personal protection device and a city monitoring system is proposed and overviewed. The solution is based on combining four modalities (signals coming from: Bluetooth, fixed and PTZ cameras, thermal camera, acoustic sensors). The Bluetooth signal is used continuously to monitor the protected person presence, and in case...
-
Integrating web site services into application through user interface
PublikacjaThe issue of integrating applications which are only accessible through visual user interface is not thoroughly researched. Integration of web applications running remotely and controlled by separate organizations becomes even more complicated, as their user interface can display differently in different browsers or change without prior notification as a result of application maintenance. While possible, it is generally not common...
-
Interaction with medical data using QR-codes
PublikacjaBar-codes and QR-codes (Quick Response ) are often used in healthcare. In this paper an application of QR-codes to exchange of laboratory results is presented. The secure data exchange is proposed between a laboratory and a patient and between a patient and Electronic Health Records. Advanced Encryption Standard was used to provide security of data encapsulated within a QR-code. The experimental setup, named labSeq is described....
-
Flexicurity. Elastyczność i bezpieczeństwo
PublikacjaFlexicurity to koncepcja łącząca elastyczność (flexibility) oraz bezpieczeństwo (security) na rynku pracy. Dokumenty strategiczne Unii Europejskiej wskazują, że docelowo funkcjonowanie europejskich rynków pracy będzie bazowało na modelu flexicurity. Koncepcja flexicurity łączy w sobie, dwa pozornie sprzeczne, pojęcia elastyczności i bezpieczeństwa. Opracowanie stanowi przegląd dokumentów Unii Europejskiej oraz publikacji naukowych...
-
On extending open source IMS platform for integrated IPTV and VoIP services over IPv6
PublikacjaEven when IMS is the most popular platform for multimedia services, the open versions of IMS ecosystem are lacking in specified functionalities for IPTVv6 and VoIPv6 services. In this paper, we extend current client and server open source software in order to provide reliability and security to these multimedia services. As a part of our work the IMS architecture for conferencing system with proposed mechanisms to improve system...
-
Analysis of an Attenuator Artifact in an Experimental Attack by Gunn–Allison–Abbott Against the Kirchhoff-Law–Johnson-Noise (KLJN) Secure Key Exchange System
PublikacjaA recent paper by Gunn–Allison–Abbott (GAA) [L. J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law–Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA’s arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an...
-
Assurance Case Patterns On-line Catalogue
PublikacjaAssurance case is an evidence-based argument demonstrating that a given property of a system (e.g. safety, security) is assured. Assurance cases are developed for high integrity systems, as in many industry domains such argu-ment is explicitly required by regulations. Despite the fact that each assurance case is unique, several reusable argument patterns have been identified and pub-lished. This paper reports work on development...
-
Architecture of Request/Response and Publish/Subscribe System Capable of Processing Multimedia Streams
PublikacjaAnaliza ''w locie'' (ang. on-the-fly) strumieni multimedialnych, zawierających wysokiej jakości dane obrazu i dźwięku, wciąż stanowi wyzwanie dla projektantów oprogramowania. Praca przedstawia architekturę systemu zdolnego do przetwarzania w czasie rzeczywistym strumieni multimedialnych przy użyciu komponentów działających w architekturze Publish/Subscribe oraz Request/Response, korzystających z możliwości Java Multimedia Framework...
-
Algorithms of chemicals detection using raman spectra
PublikacjaRaman spectrometers are devices which enable fast and non-contact identification of examined chemicals. These devices utilize the Raman phenomenon to identify unknown and often illicit chemicals (e.g. drugs, explosives)without the necessity of their preparation. Now, Raman devices can be portable and therefore can be more widely used to improve security at public places. Unfortunately, Raman spectra measurements is a challenge...
-
Threshold Attendance under Soft-Crash Model: TAG Protocol and Markovian Analysis
PublikacjaA realistic and systematic network evaluation should subsume an availability model and a failure model. We combine a "hard availability" model we call threshold attendance, whereby a certain minimum number of network elements must be present at any time, with a soft-crash failure model, whereby after experiencing a failure, a network element is still able to function correctly for a while in an emergency mode at a risk of a major...
-
Przyczółki mostowe z konstrukcją odciążającą z gruntu zbrojonego geosyntetykami
PublikacjaPrzegląd najważniejszych cech geotekstyliów i wyrobów pokrewnych, zastosowanych do budowy bloków odciążających ze szczególnym uwzględnieniem ich wytrzymałości długo i krótkookresowej oraz reologii. Określenie obciążeń działających na konstrukcję gruntową współpracującą z przyczółkiem; obciążenia normowe i rzeczywiste. Obliczenia konstrukcji z gruntu zbrojonego współpracującej z przyczółkiem