Filtry
wszystkich: 1939
wybranych: 1385
-
Katalog
- Publikacje 1385 wyników po odfiltrowaniu
- Czasopisma 325 wyników po odfiltrowaniu
- Konferencje 81 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 84 wyników po odfiltrowaniu
- Projekty 12 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Kursy Online 33 wyników po odfiltrowaniu
- Wydarzenia 3 wyników po odfiltrowaniu
- Dane Badawcze 14 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: THREATS OF PUBLIC SECURITY
-
Big Data in Regenerative Urban Design
PublikacjaWhy the use of Big Data in regenerative planning matters? The aim of this chapter is to study under what conditions Big Data can be integrated into regenerative design and sustainable planning? Authors seek to answer how – when related to the ecosystem and to human activities – Big Data can be used to: • both shape policies that support the development of regenerative human settlements, • support restorative design for practitioners...
-
Verification of the Parameterization Methods in the Context of Automatic Recognition of Sounds Related to Danger
PublikacjaW artykule opisano aplikację, która automatycznie wykrywa zdarzenia dźwiękowe takie jak: rozbita szyba, wystrzał, wybuch i krzyk. Opisany system składa się z bloku parametryzacji i klasyfikatora. W artykule dokonano porównania parametrów dedykowanych dla tego zastosowania oraz standardowych deskryptorów MPEG-7. Porównano też dwa klasyfikatory: Jeden oparty o Percetron (sieci neuronowe) i drugi oparty o Maszynę wektorów wspierających....
-
OCHRONA PRYWATNOŚCI W SYSTEMACH MONITORINGU WIZYJNEGO, PRZEGLĄD OPRACOWANYCH ARCHITEKTUR I ALGORYTMÓW
PublikacjaNieustannie rozwijające się technologie informacyjne związane z inteligentnym monitoringiem wizyjnym stwarzają ryzyko niewłaściwego wykorzystywania danych osobowych. W celu zapewnienia prawidłowej ochrony materiału wizyjnego, w ramach projektów realizowanych w Katedrze Systemów Multimedialnych WETI PG, opracowany został szereg architektur i algorytmów, które ułatwiają ochronę danych wrażliwych, takich jak: wizerunki osób, numery...
-
Platform governance for sustainable development: Reshaping citizen-administration relationships in the digital age
PublikacjaChanging governance paradigms has been shaping and reshaping the landscape of citizen-administration relationships, from impartial application of rules and regulations by administration to exercise its authority over citizens (bureaucratic paradigm), through provision of public services by administration to fulfil the needs of citizens (consumerist paradigm), to responsibility-sharing between administration and citizens for policy...
-
Investigating trip and parking characteristics of hospitals: A case study from Tri-City, Poland
PublikacjaThis research aims to investigate public hospitals’ trip and parking characteristics based on the study conducted in Poland in September 2021 on the example of the Tri-City agglomeration. The main objective of the research was to build models of the relationship between the number of trips during peak transport hours and the number of beds. The second research element was the analysis of transport behavior in these areas. The research...
-
The Bridge of Knowledge – defining and implementing national Open Access policy by Polish universities. Gdansk University of Technology perspective
PublikacjaThe European Commission states that Open Access to scientific resources funded by the European Union shall facilitate the use of research results financed from the public funds. Moreover, it will cause an increase in the innovative capacity of Europe. The Open Access landscape is determined by several factors such as mandates. The open mandate may be voluntary or mandatory and implemented at the institutional, national or international...
-
Criteria for evaluation and selection of the best offer for the Contract Engineer service
PublikacjaThe purpose of the legal regulations regarding public procurement in EU countries is to ensure effective funds' spending. When assessing and selecting the best offer, the contracting entities have at their disposal many different criteria, including non-price criteria. Their proper selection and application is necessary to ensure the high quality of the ordered product, delivery or service. Making an order for intellectual services,...
-
Organizacja systemu opieki nad seniorami wyzwaniem dla samorządów lokalnych
PublikacjaA significant part of the activities undertaken so far under the senior policy, also at the local level, have been focused on seniors’ social (physical and educational) activation. The growing number of the oldest seniors, with limited independence, living alone in single‑person households, away from their families, will force the policy priorities to be reoriented in such a way as to develop efforts to provide different types...
-
Integrated information and prediction Web Service WaterPUCK General concept
PublikacjaIn this paper, general concept of a new method as ‘Integrated information and prediction Web Service WaterPUCK’ for investigation influence of agricultural holdings and land-use structures on coastal waters of the southern Baltic Sea is presented. WaterPUCK Service is focused on determination of the current and future environmental status of the surface water and groundwater located in the Puck District (Poland) and its impact...
-
Complex Corrosion Monitoring System for Crude Distillation Unit in Form of Neutral Network
PublikacjaComplex and successful corrosion monitoring of refinery processes can significantly reduce material losses and failure risk. The developed corrosion monitoring system is based on online ultrasonic sensors, ER (electrical resistance) probes, gravimetric method and multipoint analytical analysis of chemical composition of the fluids. Additional online LPR (linear polarization resistance) sensors controlling corrosiveness of sour...
-
Designing with Green and Blue – Climate Adaption Proposals for Lowland Areas of Gdańsk
PublikacjaThe paper gives insight into issues explored within the framework of the SOS Climate Waterfront workshop that took place in Gdańsk in June 2019. The aim of the study was to propose solutions that will decrease the number of flooding events and span the gap between flood prevention strategies and the provision of other benefits such as ecological, urban, cultural and social. Historical cartography enquiries and research by the design...
-
INNOVATIVE RUN FLAT SYSTEMS
PublikacjaOne of the most essential threats to the mobility of wheeled vehicles is their relatively high sensitivity to tire damage. Tires can be damaged as a result at vehicle-targeting fire, after running on a mine or an improvised charge. The purpose of the article is to analyze the current technical solutions in wheeled vehicle tires, allowing for the unobstructed use of the vehicle despite the damage of one or several tires (RUN FLAT...
-
To Survive in a CBRN Hostile Environment: Application of CAVE Automatic Virtual Environments in First Responder Training
PublikacjaThis paper is of a conceptual nature and focuses on the use of a specific virtual reality environment in civil-military training. We analyzed the didactic potential of so-called CAVE automatic virtual environments for First Responder training, a type of training that fills the gap between First Aid training and the training received by emergency medical technicians. Since real training involves live drills based on unexpected situations,...
-
Assessment of the Environmental Impact of a Car Tire throughout Its Lifecycle Using the LCA Method
PublikacjaThere are numerous threats to the natural environment that pose a significant risk both to the environment and to human health, including car tires. Thus, there is a need to determine the impact of the life cycle of car tires on the environment, starting with the processes of raw materials acquisition, production, and ending with end-of-life management. Therefore, the authors of this study chose to do research on passenger car...
-
Hazardous material-related propagation of the effects of train accidents in the subgrade
PublikacjaA large part of the transport of hazardous materials is carried out by rail. Therefore, the security of these transports is becoming increasingly important. Every catastrophe involving dangerous materials has a negative impact on the participants of the incident and the surrounding environment, because its range is generally not local. It follows that in the event of a catastrophe, its effects should be minimized and remediation...
-
Towards the value-based design of on-line services
PublikacjaThe paper identifies economic factors shaping customer bahaviour in on-line services in two interrelated dimensions; (1) economic needs and requirements, relevant to expected benefits and values perceived by customers; (2) technical components, allowing technical realization of on-line services. Technical components were cathegorized into four groups, creating so-called VIPR model: Visual, Interactive, Process and Relationship-relevant...
-
Trustworthy Applications of ML Algorithms in Medicine - Discussion and Preliminary Results for a Problem of Small Vessels Disease Diagnosis.
PublikacjaML algorithms are very effective tools for medical data analyzing, especially at image recognition. Although they cannot be considered as a stand-alone diagnostic tool, because it is a black-box, it can certainly be a medical support that minimize negative effect of human-factors. In high-risk domains, not only the correct diagnosis is important, but also the reasoning behind it. Therefore, it is important to focus on trustworthiness...
-
Concept of Multifactor Method and Non-Functional Requirements Solution to Increase Resilience through Functional Safety with Cybersecurity Analysis
PublikacjaIn the process of designing safety systems, an integrated approach in safety and cybersecurity analysis is necessary. The paper describes a new technique of increasing resilience through integrated analysis of functional safety and cybersecurity. It is a modeling methodology based on the combination of the multifactor method utilizing modified risk graphs, used previously for Safety Integrity Level (SIL) assessment, and the Non-Functional...
-
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublikacjaAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
On the fast BSS transition algorithms in the IEEE 802.11r local area wireless networks
PublikacjaHandover performance is critical to support multimedia services that are becoming increasingly available over the wireless devices. The high transition delay can be unaccepted for such services or can be a source of disruption on the session. On the other side, IEEE 802.11 standard is being extended with new functionalities. Security and QoS features, included in recent IEEE 802.11-2007 standard, add management frames that are...
-
Realistic noise-tolerant randomness amplification using finite number of devices
PublikacjaRandomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublikacjaFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
Summary = Podsumowanie
PublikacjaPublikacja "Public Space - the European City Determinant" jest wynikiem seminarium naukowego, które odbyło się na Politechnice Gdańskiej jako część warsztatów architektonicznych "E-pavilion". Doktoranci zostali poproszeni o wygłoszenie referatów, związanych z ich pracami badawczymi, na temat "Przestrzeń publiczna - determinanta miasta europejskiego". Przedsięwzięcie to miało na celu wieloaspektową analizę jakości przestrzeni publicznej...
-
Speace frienly for the blind = Przestrzeń przyjazna dla niewidomych
PublikacjaThe article presents issues connected with accessibility of public space for people with eyesight disabilities. The use of the extravisual spatial stimuli in shaping the urban environment has been analysed. Spaces in which musltisensory spatial reception is feasible become user-friendly, as they come to meet the changing needs of their users. The article introduces a system of textures aiding spatial orientation, navigation and...
-
EGNOS-based GNSS receiver for precise positioning in restricted areas
PublikacjaPositioning accuracy is very important in many areas, whereas the typical GPS receiver accuracy is often not sufficient. The European Geostationary Navigation Overlay Service (EGNOS), Europe’s first venture into satellite navigation, improves the open public service offered by the Global Positioning System (GPS). As a satellite navigation augmentation system, EGNOS improves the accuracy of GPS by providing a positioning accuracy...
-
Meeting Modernisms in Gdynia
PublikacjaThe paper focused on the architectural heritage of the city of Gdynia, in Poland, built in 1920s and 1930s. The city was established (founded) on the seaside of the Baltic Sea as the only port of Poland – a country that regained independence after Versailles Treaty. The history of the city, built from scratch is outstanding in Europe. Modernist architecture of the city is represented by buildings built for different purposes: housing,...
-
Towards a Smart Sustainable City Roadmap
PublikacjaThis workshop of the CAP4CITY (Erasmus+ Strengthening Governance Capacity for Smart Sustainable Cities) project is to promote and stimulate the discussion and networking in the area of Digital Government. Smart Sustainable Cities and related concepts of Digital, Intelligent and Smart Cities represent a progression of how cities around the world apply digital technology to serve their populations, pursue sustainable socio-economic...
-
Zagrożenia bezpieczeństwa protokołów komunikacji morskiej, lotniczej i lądowej
PublikacjaW artykule przedstawiono przykładowe zagrożenia wykorzystujące słabości wybranych protokołów komunikacji morskiej, lotniczej i lądowej. Wskazano, jakie czynności należy podjąć, żeby się przed nimi ustrzec (przynajmniej częściowo). Opisano również kierunek, w jakim powinny być rozwijane analizowane protokoły, aby zwiększyć bezpieczeństwo osób je używających.
-
Architektura współczesnego muzeum i jej znaczenie dla tożsamości krajobrazu miasta = The Architecture of Contemporary Museum and its Significance for the Identity of the Urban Landscape
PublikacjaArtykuł dotyczy architektury współczesnych muzeów, które pod koniec XX w. przeszły znaczący rozwój jako instytucje publiczne. Oprócz specyficznych wymagań technicznych, funkcjonalnych, estetycznych i kulturowych, ich charakterystyczną cechą jest wzrastające zapotrzebowanie na przestrzeń dodatkową służącą edukacji, odpoczynkowi, rozrywce i strefie komercyjnej (handlu i usług). Atrakcyjna przestrzeń publiczna zapewnia dostęp do wszystkich...
-
Tworzenie wartości dla akcjonariuszy w świetle nadzoru korporacyjnego
PublikacjaDuży odsetek spółek publicznych w Polsce nie tworzy wartości dla akcjonariuszy. Zaprezento-wano wyniki badań dotyczących wpływu struktur własności na efektywność działania spółek pu-blicznych. Badania te nie były w stanie wyjaśnić w wystarczającym stopniu zjawiska destrukcji warto-ści. Starano się wykazać, że jedną z przyczyn tego zjawiska jest transfer wartości. Zalicza się go do głównych problemów nadzoru korporacyjnego. Szczególna...
-
Wybrane rozwiązania prawne z ustawy z 2019 roku – Prawo zamówień publicznych w ocenie polskich przedsiębiorstw
PublikacjaPrzedmiotem analizy w niniejszym artykule jest instytucja zamówień publicznych, uregulowanych aktualnie obowiązującą ustawą – Prawo zamówień publicznych z 2019 r . Analiza ta dotyczy w szczególności nowoprzyjętych w niej zapisów prawnych – nowych w stosunku do obowiązujących poprzednio. Uzasadnieniem wprowadzenia przez ustawodawcę wielu nowych rozwiązań była chęć ułatwienia przedsiębiorcom uczestniczenia...
-
LOKALIZACJA OBIEKTÓW BUDOWLANYCH W SĄSIEDZTWIE LINII 110 kV
PublikacjaW artykule omówiono wymagania przepisów w zakresie dopuszczalnych wartości pola elektrycznego i magnetycznego niskiej częstotliwości. Przedstawiono wyniki obliczeń rozkładu pola elektrycznego metodą ładunków stymulowanych i w programie FEMM dla przykładowej lokalizacji obiektu przemysłowego w sąsiedztwie linii 110 kV.
-
Investigating the sustainability, utilisation, consumption and conservation of sea mammals – A systematic review
PublikacjaAlmost 80 % of the oceans, especially the Arctic and Subarctic are primarily inhabited by marine mammals. Marine species depend mostly on sea ice for food, raising their young ones and safeguarding themselves from predators. Consumption of marine mammals has always been recommended as healthy, but the truth is that it can be detrimental for human health because of sea water pollution from trash and chemicals. This systematic review...
-
Innovative investment funds and stability of financial systems: Nonparametric study of exchange-traded funds in Europe
PublikacjaThe main aim of the paper is investigation of the potential contribution of exchange-trade funds (ETFs) to the instability of the European financial systems. The paper begins with presentation of the key theoretical concepts with regard to ETFs and financial stability. We discuss the key attributes of ETFs as the innovative category of investment funds, their hypothesized impact on the financial stability as well as briefly describe...
-
Stability Assessment of Coastal Cliffs Incorporating Laser Scanning Technology and a Numerical Analysis
PublikacjaWe investigated the cli coast in Jastrzebia Gora, Poland. The measurements that were taken between 2014 and 2018 by applying terrestrial, mobile, and airborne laser scanning describe a huge geometric modification involving dislocations in a 2.5 m range. Dierential maps and a volumetric change analysis made it possible to identify the most deformed cli’s location. Part of the monitoring of coastal change involved the measurement...
-
Detection of People Swimming in Water Reservoirs with the Use of Multimodal Imaging and Machine Learning
PublikacjaEvery year in many countries, there are fatal unintentional drownings in different water reservoirs like swimming pools, lakes, seas, or oceans. The existing threats of this type require creating a method that could automatically supervise such places to increase the safety of bathers. This work aimed to create methods and prototype solutions for detecting people bathing in water reservoirs using a multimodal imaging system and...
-
Critical perspectives on media architecture: is it still possible to design projects without negatively affecting urban nighttime environments and will the future remain dynamic, bright and multi-colored?
PublikacjaNowadays, due to advances in electrical devices, new digital media, lighting, information and communication technologies, cities are being used 24/7. The paper discusses critical aspects of Media Architecture in the context of public spaces as well as urban nighttime environments from the perspective of a practising lighting architect. The author examines recent issues of negative design approaches and presents proposals for improving...
-
Move into the open space – what can we expect from moving artistic interventions to open urban spaces?
PublikacjaThe paper discuses the role of incorporating creative engagement into the processes of urban and social development using cultural means of action and expression and the potential of artistic interventions in public space. The block of initiatives within the People’s Smart Sculpture EU project, realized by Gdańsk City Gallery, has been named “Move Into The Open Space”. This paper will provide...
-
Gender differences in the perception of the Quality of College Life in Spanish University
PublikacjaThrough the current research, we intend to analyse how students differ in their levels of quality of college life (QCL) according to gender, and how this relates to overall quality of life (QoL) and loyalty [measured by Identification and word of mouth (WoM)] to their specific university. The survey included 243 students attending public university in Spain. The results obtained through the analysis of data allow affirming that...
-
Mechanizmy komunikacji w rozproszonych systemach specjalnego przeznaczenia
PublikacjaZadania ochrony i bezpieczeństwa granic państwa realizowane przez Straż Graniczną wymagają wsparcia ze strony nowoczesnych systemów Technologii Informacyjnych (TI) uwarunkowanych ich specjalnym przeznaczeniem. Z uwagi na charakter tej służby, rozwiązania dla jej potrzeb muszą być realizowane jako systemy rozproszone umożliwiające przenoszenie i przetwarzanie informacji głosowych oraz różnorodnych danych, w tym specjalnego przeznaczenia....
-
Automatyczna weryfikacja klienta bankowego w oparciu o multimodalne technologie biometryczne
PublikacjaW referacie przedstawiono przegląd rozwiązań wykorzystywanych w bankach do weryfikacji tożsamości klientów. Ponadto zawarto opis metod biometrycznych aktualnie wykorzystywanych w placówkach bankowych wraz z odniesieniem do skuteczności i wygody korzystania z dostępnych rozwiązań. Zaproponowano rozszerzenie zakresu wykorzystania technologii biometrycznych, wskazując kierunek rozwoju systemów bezpieczeństwa dla poprawy dostępu do...
-
Identification of High-Value Dataset determinants: is there a silver bullet for efficient sustainability-oriented data-driven development?
PublikacjaOpen Government Data (OGD) are seen as one of the trends that has the potential to benefit the economy, improve the quality, efficiency, and transparency of public administration, and change the lives of citizens, and the society as a whole facilitating efficient sustainability-oriented data-driven services. However, the quick achievement of these benefits is closely related to the “value” of the OGD, i.e., how useful, and reusable...
-
Threshold Attendance under Soft-Crash Model: TAG Protocol and Markovian Analysis
PublikacjaA realistic and systematic network evaluation should subsume an availability model and a failure model. We combine a "hard availability" model we call threshold attendance, whereby a certain minimum number of network elements must be present at any time, with a soft-crash failure model, whereby after experiencing a failure, a network element is still able to function correctly for a while in an emergency mode at a risk of a major...
-
Implementation of integrated control In drinking water distribution systems - IT system proposal
PublikacjaImplementation of integrated control algorithms requires suitable hardware and software platforms. Proposed solution must allow realizing control and monitoring tasks, while ensuring high reliability and security of processed data. Additionally, the software and hardware solutions must be immune to outside influence. This paper presents an approach to implementation of control systems in drinking water distribution system. Presented...
-
Architecture of Request/Response and Publish/Subscribe System Capable of Processing Multimedia Streams
PublikacjaAnaliza ''w locie'' (ang. on-the-fly) strumieni multimedialnych, zawierających wysokiej jakości dane obrazu i dźwięku, wciąż stanowi wyzwanie dla projektantów oprogramowania. Praca przedstawia architekturę systemu zdolnego do przetwarzania w czasie rzeczywistym strumieni multimedialnych przy użyciu komponentów działających w architekturze Publish/Subscribe oraz Request/Response, korzystających z możliwości Java Multimedia Framework...
-
Flexicurity. Elastyczność i bezpieczeństwo
PublikacjaFlexicurity to koncepcja łącząca elastyczność (flexibility) oraz bezpieczeństwo (security) na rynku pracy. Dokumenty strategiczne Unii Europejskiej wskazują, że docelowo funkcjonowanie europejskich rynków pracy będzie bazowało na modelu flexicurity. Koncepcja flexicurity łączy w sobie, dwa pozornie sprzeczne, pojęcia elastyczności i bezpieczeństwa. Opracowanie stanowi przegląd dokumentów Unii Europejskiej oraz publikacji naukowych...
-
On extending open source IMS platform for integrated IPTV and VoIP services over IPv6
PublikacjaEven when IMS is the most popular platform for multimedia services, the open versions of IMS ecosystem are lacking in specified functionalities for IPTVv6 and VoIPv6 services. In this paper, we extend current client and server open source software in order to provide reliability and security to these multimedia services. As a part of our work the IMS architecture for conferencing system with proposed mechanisms to improve system...
-
Analysis of an Attenuator Artifact in an Experimental Attack by Gunn–Allison–Abbott Against the Kirchhoff-Law–Johnson-Noise (KLJN) Secure Key Exchange System
PublikacjaA recent paper by Gunn–Allison–Abbott (GAA) [L. J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law–Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA’s arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an...
-
Interaction with medical data using QR-codes
PublikacjaBar-codes and QR-codes (Quick Response ) are often used in healthcare. In this paper an application of QR-codes to exchange of laboratory results is presented. The secure data exchange is proposed between a laboratory and a patient and between a patient and Electronic Health Records. Advanced Encryption Standard was used to provide security of data encapsulated within a QR-code. The experimental setup, named labSeq is described....
-
Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej – wymagania i kryteria
PublikacjaNiniejsza praca poświęcona jest zagadnieniom zarządzania bezpieczeństwem funkcjonalnym w cyklu życia z uwzględnieniem norm międzynarodowych PN-ENIEC 61508 i PN-ENIEC 61511 oraz zarządzaniu bezpieczeństwem informacji w systemach i sieciach komputerowych w nawiązaniu do wytycznych OECD i wymagań normy PN-ISO/IEC 27001. Rozważa się przykłady skupionych i rozproszonych sieci komputerowych pełniących funkcje monitorowania, sterowania...