Filtry
wszystkich: 26352
wybranych: 4028
-
Katalog
- Publikacje 4028 wyników po odfiltrowaniu
- Czasopisma 585 wyników po odfiltrowaniu
- Konferencje 262 wyników po odfiltrowaniu
- Wydawnictwa 2 wyników po odfiltrowaniu
- Osoby 516 wyników po odfiltrowaniu
- Wynalazki 1 wyników po odfiltrowaniu
- Projekty 23 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Kursy Online 130 wyników po odfiltrowaniu
- Wydarzenia 3 wyników po odfiltrowaniu
- Dane Badawcze 20801 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: INFORMATION%20SECURITY
-
Snow Cover Studies: a Review on the Intensity of Human Pressure
PublikacjaSnow cover should be treated as a highly dynamic medium. A variety of physical and chemical processes interact to alter its chemical composition and affect the metamorphism of its individual crystals and layers; this, in turn, has a direct influence on their mutual adhesion, and ultimately on the stability of the entire snow cover. The literature data here reported provide basic information on the forms of solid precipitation,...
-
Principles of target DNA cleavage and the role of Mg2+ in the catalysis of CRISPR–Cas9
PublikacjaAt the core of the CRISPR–Cas9 genome-editing technology, the endonuclease Cas9 introduces site-specific breaks in DNA. However, precise mechanistic information to ameliorate Cas9 function is still missing. Here, multimicrosecond molecular dynamics, free energy and multiscale simulations are combined with solution NMR and DNA cleavage experiments to resolve the catalytic mechanism of target DNA cleavage. We show that the conformation...
-
Complexation of amino acids derivatives in water by calix[4]arene phosphonic acids
PublikacjaSeries of the calix[4]arene phosphonic acids with various substituents at the lower rim was synthesized. Complexing properties of these receptors towards methyl esters of six amino acids strongly depended on the calix[4]arene conformation flexibility. The complex formation processes were monitored using 1H NMR spectroscopy (deuterated phosphate buffer at pD 7.3, 22 oC) and association constant values were evaluated. Inherently...
-
Impact of Work on the Well-Being of Police Officers and Firefighters
PublikacjaWork is one of the most important spheres of human functioning and has a significant impact on individual overall well-being. The purpose of this study is to assess the positive and negative impact of the work of police officers and firefighters on their well-being in different spheres of life. In particular, the study examines the relationship between the type of occupation and the elements that generate a feeling of well-being,...
-
Fatigue and Professional Burnout in Police Officers and Firefighters
PublikacjaExcessive demands, work overload and the working time arrangements are an important cause of burnout and fatigue in employees. Specific working time arrangements are characteristic of the internal security services, such as police officers and firefighters. This applies to both the ordering of day and night shifts and the length of shifts. Depletion of personal resources is a common component for acute fatigue and burnout. However,...
-
Identification of Emotional States Using Phantom Miro M310 Camera
PublikacjaThe purpose of this paper is to present the possibilities associated with the use of remote sensing methods in identifying human emotional states, and to present the results of the research conducted by the authors in this field. The studies presented involved the use of advanced image analysis to identify areas on the human face that change their activity along with emotional expression. Most of the research carried out in laboratories...
-
The Effectiveness of Basic Resuscitation Activities Carried out by Combat Paramedics of the Police, as Exemplified by Polish Counterterrorist Units
PublikacjaThe tasks carried out by Police officers are often accompanied by dangerous situations that threaten the life and health of the people involved, the police themselves, and bystanders. It concerns especially counter-terrorism police units whose activities are aimed at terrorists and particularly dangerous criminals, and their course is violent and aggressive. In conjunction with the inability to bring civilian rescue services into...
-
Review of Cybersecurity Assessment Methods: Applicability Perspective
PublikacjaCybersecurity assessments are crucial in building the assurance that vital cyberassets are effectively protected from threats. Multiple assessment methods have been proposed during the decades of the cybersecurity field. However, a systematic literature search described in this paper reveals that their reviews are practically missing. Thus, the primary objective of this research was to fulfil this gap by comprehensively identifying...
-
Evaluation of Professional Demands and Financial Reward Through the Perception of Police Managers
PublikacjaThe aim of the study was to examine the relationship between job demands and salary in the subjective perception of mid-level police managers. An occupational stress model in which effort spent on job demands are not balanced by the received reward, was adopted. The study comprised 51 police officers (4 women). The partial least squares method was used for the analysis, and the SmartPLS 2.0 program was applied. The income and...
-
Modelling the malware propagation in mobile computer devices
PublikacjaNowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...
-
Psychosocial risks associated with the profession of train driver
PublikacjaExcellent competencies as well as a good physical and mental health are required in train drivers’ profession. Despite the changes in the structure of employment the train drivers above 46 years and job tenure longer than 30 years are the largest group. The generation gap is becoming more pronounced, and its fulfilment will not be easy. It is related not only to training of new personnel but also promotion of healthy work environment...
-
A Review of Standards with Cybersecurity Requirements for Smart Grid
PublikacjaAssuring cybersecurity of the smart grid is indispensable for the reliable operation of this new form of the electricity network. Experts agree that standardised solutions and practices should be applied in the first place. In recent years many new standards for smart grids have been published, which paradoxically results in the difficulty of finding a relevant publication in this plethora of literature. This paper presents results...
-
On symmetric extendibility of quantum states and its applications
PublikacjaThis dissertation is focused on analysis of the symmetric extendibility of quantum states and its applications in the quantum information theory, with special attention paid to the area of quantum entanglement distillation, quantum channels theory, quantum security, and monogamy of quantum entanglement in time. We analyze geometry of the set of symmetric extendible states, i.e. such states that possess symmetric extensions and...
-
Establishing the allosteric mechanism in CRISPR‐Cas9
PublikacjaAllostery is a fundamental property of proteins, which regulates biochemical information transfer between spatially distant sites. Here, we report on the critical role of molecular dynamics (MD) simulations in discovering the mechanism of allosteric communication within CRISPR‐Cas9, a leading genome editing machinery with enormous promises for medicine and biotechnology. MD revealed how allostery intervenes during at least three...
-
Corrigendum to “T1 relaxation time callibration in magnetic resonance imaging using nanodiamond phantoms” [Phys Med 94 (2022) S119–S120/EPV029]
PublikacjaThe authors want to update the incorrect funding information. The correct funding note is: “The authors acknowledge the financial support from Gdańsk University of Technology by the 4/2020/IDUB/III.4.1/Tc grant under the Technetium Talent Management Grants ‘Excellence Initiative – Research University’. The financial support from Gdańsk University of Technology by the 1/2021/IDUB/II.2/Np grant under NEPTUNIUM Enhancing Baltic Region...
-
Wykorzystanie Web 2.0 oraz architektury informacji w pracy brokera informacji.
PublikacjaThe development of information and communication technologies, dissemination of access as well as unlimited increase of publications result in the uncontrolled growth of knowledge resources. Looking up for the relevant information becomes increasingly difficult, especially when time plays a role. Such process requires vast knowledge, practical experience in obtaining and providing information and also analytical skills that...
-
Non-Destructive Testing of the Longest Span Soil-Steel Bridge in Europe—Field Measurements and FEM Calculations
PublikacjaThe article describes interdisciplinary and comprehensive non-destructive diagnostic tests of final bridge inspection and acceptance proposed for a soil-steel bridge made of corrugated sheets, being the European span length record holder (25.74 m). As an effect of an original concept a detailed and precise information about the structure short-term response was collected. Periodic diagnostics of bridge deformations was done one...
-
Fake News: Possibility of Identification in Post-Truth Media Ecology System
PublikacjaInformation comes as basic good which affects social well-being. A modern society and a modern state – its administration, education, culture, national economy and armed forces – cannot function efficiently without a rationally developed field of information. The quality of the functioning of that system depends on a specific feature of information, that is namely: its reliability which makes it possible for us to evaluate accuracy,...
-
Functional Safety and Cybersecurity Analysis and Management in Smart Manufacturing Systems
PublikacjaThis chapter addresses some of the issues of the integrated functional safety and cybersecurity analysis and management with regard to selected references and the functional safety standards: IEC 61508, IEC 61511, ISO 13849-1 and IEC 62061, and a cybersecurity standard IEC 62443 that concerns the industrial automation and control systems. The objective is to mitigate the vulnerability of industrial systems that include the information...
-
Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents
PublikacjaElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...
-
Edible dragonflies and damselflies (order Odonata) as human food – A comprehensive review
PublikacjaThe rapid growth of the human population leads to a big concern about the food y and demand worldwide. However, due to the reduction in global arable land area, humans need to find alternative food sources to fulfil their needs. Consequently, edible insects have been identified as a promising solution to ameliorate food security and increase global nutrition. Among more than 2,100 identified edible insect species, dragonflies and...
-
Logistics of Transnational Corporations as the Basis of Cooperation Between Ukraine and EU (for Poland Example)
PublikacjaThe article describes the scientific and theoretical basis for the organization of logistics management of modern international corporations, owning by assets in mining and metallurgical business in Ukraine and Poland; it had been analyzed the influence of transfer pricing mechanism as one of the main factors affecting on the efficiency of the organization of supply chain of resources (Ukrainian semi-finished goods) to ensure uninterrupted...
-
Analytical studies of spectrum broadcast structures in quantum Brownian motion
PublikacjaSpectrum broadcast structures are a new and fresh concept in the quantum-to-classical transition, introduced recently in the context of decoherence and the appearance of objective features in quantum mechanics. These are specific quantum state structures, responsible for the objectivization of the decohered state of a system. Recently, they have been demonstrated by means of the well-known quantum Brownian motion model of the recoilless...
-
Intraday price reaction to filing bankruptcy and restructuring proceedings – the evidence from Poland
PublikacjaThis chapter presents the results of research on the price reaction of shares listed on the Warsaw Stock Exchange to filing bankruptcy and/or restructuring applications. Event study was adopted as the research method, and it was performed at 10, 5, and 1-minute intervals. It was found that the reaction is rapid, as it takes 1–2 minutes after the information on bankruptcy and restructuring applications was made public. Significantly...
-
The application of non-destructive methods in the diagnostics of the approach pavement at the bridges
PublikacjaThe article presents the possibility of using non-destructive methods of road pavement diagnostics as an alternative to traditional means to assess the reasons for premature cracks adjacent to bridge objects. Two scanning methods were used: laser scanning to measure geometric surface deformation and ground penetrating radar (GPR) inspection to assess the road pavement condition. With the use of a laser scanner, an effective tool...
-
The methods of secure data transmission in the KNX system
PublikacjaThe article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.
-
Effects of Xanthan Gum Biopolymer on the Permeability, Odometer, Unconfined Compressive and Triaxial Shear Behavior of a Sand
PublikacjaBiopolymers, which are microbially induced polymers, can be used as an alternative material to improve engineering performance of soils. In this paper, a laboratory study of 0.075-1.0 mm size sand and biopolymer (i.e., xanthan gum) mixtures with various mix ratios (0%, 0.5%, 1.0%, and 1.5%) was performed. The materials, specimen preparation, and test methods are described, as are the results of a suite of permeability, odometer, unconfined...
-
A novel in vivo approach to assess strains of the human abdominal wall under known intraabdominal pressure
PublikacjaThe study concerns mechanical behaviour of a living human abdominal wall. A better mechanical understanding of a human abdominal wall and recognition of its material properties is required to find mechanically compatible surgical meshes to significantly improve the treatment of ventral hernias. A non-invasive methodology, based on in vivo optical measurements is proposed to determine strains of abdominal wall corresponding to...
-
In vivo performance of intraperitoneal onlay mesh after ventral hernia repair
PublikacjaBackground: Ventral hernia repair needs to be improved since recurrence, postoperative pain and other complications are still reported in many patients. The behavior of implants in vivo is not sufficiently understood to design a surgical mesh mechanically compatible with the human abdominal wall. Methods: This analysis was based on radiological pictures of patients who underwent laparoscopic ventral hernia repair. The pictures...
-
Algorithms of chemicals detection using raman spectra
PublikacjaRaman spectrometers are devices which enable fast and non-contact identification of examined chemicals. These devices utilize the Raman phenomenon to identify unknown and often illicit chemicals (e.g. drugs, explosives)without the necessity of their preparation. Now, Raman devices can be portable and therefore can be more widely used to improve security at public places. Unfortunately, Raman spectra measurements is a challenge...
-
Chiral analysis of chloro intermediates of methylamphetamine by one-dimensional and multidementional NMR and GC/MS
PublikacjaImpurity profiling and classification of abused drugs using chiral analytical techniques is of particular interest and importance because of the additional information obtained fromthis approach. When these methods are applied to the synthesis of illicitly used substances, they can supply valuable information about the conditions/chemicals used in the synthesis. We have applied GC and NMR methods to the study of intermediates found...
-
Decisional-DNA Based Smart Production Performance Analysis Model
Publikacjan order to allocate resources effectively according to the production plan and to reduce disturbances, a framework for smart production performance analysis is proposed in this article. Decisional DNA based knowledge models of engineering objects, processes and factory are developed within the proposed framework. These models are the virtual representation of manufacturing resources, and with help of Internet of Things, are capable...
-
MiMSeg - an algorithm for automated detection of tumor tissue on NMR apparent diffusion coefficient maps.
Publikacja -
Acceleration of decision making in sound event recognition employing supercomputing cluster
PublikacjaParallel processing of audio data streams is introduced to shorten the decision making time in hazardous sound event recognition. A supercomputing cluster environment with a framework dedicated to processing multimedia data streams in real time is used. The sound event recognition algorithms employed are based on detecting foreground events, calculating their features in short time frames, and classifying the events with Support...
-
Bimodal deep learning model for subjectively enhanced emotion classification in films
PublikacjaThis research delves into the concept of color grading in film, focusing on how color influences the emotional response of the audience. The study commenced by recalling state-of-the-art works that process audio-video signals and associated emotions by machine learning. Then, assumptions of subjective tests for refining and validating an emotion model for assigning specific emotional labels to selected film excerpts were presented....
-
Medical Image Segmentation Using Deep Semantic-based Methods: A Review of Techniques, Applications and Emerging Trends
PublikacjaSemantic-based segmentation (Semseg) methods play an essential part in medical imaging analysis to improve the diagnostic process. In Semseg technique, every pixel of an image is classified into an instance, where each class is corresponded by an instance. In particular, the semantic segmentation can be used by many medical experts in the domain of radiology, ophthalmologists, dermatologist, and image-guided radiotherapy. The authors...
-
Massive surveillance data processing with supercomputing cluster
PublikacjaIn recent years, increasingly complex algorithms for automated analysis of surveillance data are being developed. The rapid growth in the number of monitoring installations and higher expectations of the quality parameters of the captured data result in an enormous computational cost of analyzing the massive volume of data. In this paper a new model of online processing of surveillance data streams is proposed, which assumes the...
-
Fast collaborative graph exploration
PublikacjaWe study the following scenario of online graph exploration. A team of k agents is initially located at a distinguished vertex r of an undirected graph. At every time step, each agent can traverse an edge of the graph. All vertices have unique identifiers, and upon entering a vertex, an agent obtains the list of identifiers of all its neighbors. We ask how many time steps are required to complete exploration, i.e., to make sure...
-
Early Stages of RNA-Mediated Conversion of Human Prions
PublikacjaPrion diseases are characterized by the conversion of prion proteins from a PrPC fold into a disease-causing PrPSC form that is self-replicating. A possible agent to trigger this conversion is polyadenosine RNA, but both mechanism and pathways of the conversion are poorly understood. Using coarse-grained molecular dynamic simulations we study the time evolution of PrPC over 600 μs. We find that both the D178N mutation and interacting...
-
Theory and implementation of a virtualisation level Future Internet defence in depth architecture
PublikacjaAn EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...
-
Validation of a virtual test environment for C2X communication under radio jamming conditions
PublikacjaIn this paper, we propose a novel car-2-x communication security testing methodology in the physical layer of wireless systems. The approach is dedicated to automated testing of autonomous vehicles and it is essential for such complex systems operation, especially with regard to safety and security issues. It is based on scenario-driven testing in virtual and real test environments created from collected or simulated data. The...
-
On analysis of nanocomposite conical structures
PublikacjaThis research examines the analysis of rotating truncated conical baskets reinforced by carbon nanotubes around the two independent axes. A time-dependent analysis is considered, and the nonlinear dynamic governing equations are extracted using the energy method. Carbon nanotubes (CNTs) reinforced the conical basket, and the structure's mechanical properties are determined based on the several distributions of carbon nanotubes....
-
Semantic Analysis and Text Summarization in Socio-Technical Systems
PublikacjaIn this chapter the authors present the results of the development the methodology for increasing the reliability of the functioning of the Socio-Technical System. The existed methods and algorithms for processing unstructured (textual) information were studied. Taking into account noted above strengths and weaknesses of Discriminant and Probabilistic approaches of Latent Semantic Relations analysis in of the summarization projection...
-
Evaluation of compression realization in diesel engine based on performance indicator changes
PublikacjaIn the article a method of evaluation of a diesel engine during the realization of processes of working cycle on the example of compression is described. The method is based on the use of the quantity called performance indicator in the description of the engine's work, which contains the information on the energy values, which may be disposed using the engine and the time at which it can be delivered. Theoretical information has...
-
Uprawnienie do uzyskania od administratora informacji o odbiorcach lub o kategoriach odbiorców a cele prawa dostępu do danych. Glosa do wyroku TS z dnia 12 stycznia 2023 r., C-154/21 (RW przeciwko Österreichische Post AG)
PublikacjaGiven the complexity of modern data processing, individuals often do not know to whom controllers provide the information collected about them. In the commented judgment, the Court ruled that the controller is bound by the data subjects’ request to access information about the identity of the specific recipients of their data and has limited ability to provide them with information about the categories of recipients. This interpretation...
-
Broadcast copies reveal the quantumness of correlations
PublikacjaWe study the quantumness of bipartite correlations by proposing a quantity that combines a measure of total correlations-mutual information-with the notion of broadcast copies-i.e., generally nonfactorized copies-of bipartite states. By analyzing how our quantity increases with the number of broadcast copies, we are able to classify classical, separable, and entangled states. This motivates the definition of the broadcast regularization...
-
PRINCIPLES OF ARTIFICIAL INTELLIGENCE APPLICATION IN CONTROL OF THE ENTERPRISE
PublikacjaThe implementation of the tasks of evaluating historical financial information, the control or audit of business activities are based primarily on professional judgments about the object of study of a professional accountant or auditor. Their findings are drawn on the basis of the study of documents, the use of audit evidence, risk assessment, etc. There is always a probability (and rather high) that professional judgment will...
-
Mechanizmy bezpieczeństwa transmisji w systemie netBaltic
Publikacjaartykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
An Evaluation Engine for Dynamic Ranking of Cloud Providers
PublikacjaThe paper focuses on creation of an effective dynamic ranking service for IaaS, PaaS and SaaS cloud providers. It considers building a quality model for this purpose along with definition of quality measure- ment procedures. The paper discusses several techniques known from already existing price comparison engines that could be modified and adopted for comparison of cloud providers. A technique for filtering measured data is proposed,...
-
Study of Multi-Class Classification Algorithms’ Performance on Highly Imbalanced Network Intrusion Datasets
PublikacjaThis paper is devoted to the problem of class imbalance in machine learning, focusing on the intrusion detection of rare classes in computer networks. The problem of class imbalance occurs when one class heavily outnumbers examples from the other classes. In this paper, we are particularly interested in classifiers, as pattern recognition and anomaly detection could be solved as a classification problem. As still a major part of...