Filtry
wszystkich: 8134
wybranych: 5790
-
Katalog
- Publikacje 5790 wyników po odfiltrowaniu
- Czasopisma 632 wyników po odfiltrowaniu
- Konferencje 249 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 339 wyników po odfiltrowaniu
- Wynalazki 1 wyników po odfiltrowaniu
- Projekty 22 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Aparatura Badawcza 2 wyników po odfiltrowaniu
- Kursy Online 246 wyników po odfiltrowaniu
- Wydarzenia 7 wyników po odfiltrowaniu
- Dane Badawcze 844 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: CYBER PHYSICAL SYSTEMS
-
Decisional-DNA Based Smart Production Performance Analysis Model
Publikacjan order to allocate resources effectively according to the production plan and to reduce disturbances, a framework for smart production performance analysis is proposed in this article. Decisional DNA based knowledge models of engineering objects, processes and factory are developed within the proposed framework. These models are the virtual representation of manufacturing resources, and with help of Internet of Things, are capable...
-
Integrated approach for functional safety and cyber security management in maritime critical infrastructures
PublikacjaThe work is devoted important issues of the management in maritime critical infrastructure of functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to cyber security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with...
-
A New Critical Risk on the Block: Cyber Risks as an Example of Technical Knowledge Risks in Organizations
PublikacjaThe breakout of the COVID-19 pandemic has intensified the appearance of many additional technical knowledge risks in organizations. Cyber risks in particular are becoming a great challenge for organizations. At the same time, academic research on cyber risks, their costs, consequences and ability of overcoming them is still scarce and fragmented. In order to fill this gap, the paper is aimed to identify different types of cyber...
-
The effect of environmental turbulence on cyber security risk management and organizational resilience
PublikacjaEven though there is a plethora of research on the role of environmental turbulence in organizational performance in general, little attention has been paid to the effect of environmental turbulence on cyber security risk management and further - organizational resilience. Drawing on the resource-based view and contingency theory, this study investigates how technological and market turbulence influence organizational cyber security...
-
Smart Decisional DNA Technology to Enhance Industry 4.0 Environment in Conjunction with Conventional Manufacturing
PublikacjaKnowledge-based support has become an indispensable part not only to the traditional manufacturing set-ups but also to the new fast-emerging Industry 4.0 scenario. In this regard, successful research has been performed and extensively reported to develop Decisional DNA based knowledge representation models of engineering object and engineering process called Virtual engineering object (VEO), Virtual engineering process (VEP) and...
-
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics
PublikacjaThe contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...
-
Contextual Knowledge to Enhance Workplace Hazard Recognition and Interpretation in a Cognitive Vision Platform
PublikacjaThe combination of vision and sensor data together with the resulting necessity for formal representations builds a central component of an autonomous Cyber Physical System for detection and tracking of laborers in workplaces environments. This system must be adaptable and perceive the environment as automatically as possible, performing in a variety of plants and scenes without the necessity of recoding the application for each...
-
Face recognition by humans with gaze-tracking system Cyber-Eye
PublikacjaW celu dokładniejszego zrozumienia sposobu rozpoznawania i zapamiętywania twarzy przez człowieka przeprowadzono doświadczenie na grupie 20 osób z wykorzystaniem wcześniej opracowanego systemu śledzenia fiksacji wzroku Cyber-Oko [3]. Wykorzystując diody i kamerę podczerwieni wraz z dedykowanym oprogramowaniem Cyber-Oko, które pozwala na śledzenie punktu skupienia wzroku na ekranie. Każdej osobie biorącej udział w doświadczeniu pokazano...
-
Towards an experience based collective computational intelligence for manufacturing
PublikacjaKnowledge based support can play a vital role not only in the new fast emerging information and communication technology based industry, but also in traditional manufacturing. In this regard, several domain specific research endeavors have taken place in the past with limited success. Thus, there is a need to develop a flexible domain independent mechanism to capture, store, reuse, and share manufacturing knowledge. Consequently,...
-
Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment
PublikacjaThe smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...
-
Badanie rozpoznawania twarzy przez człowieka z wykorzystaniem systemu śledzenia fiksacji wzroku Cyber-Oko
PublikacjaW celu dokładniejszego zrozumienia sposobu rozpoznawania i zapamiętywania twarzy przez człowieka przeprowadzono doświadczenie na grupie 20 osób z wykorzystaniem wcześniej opracowanego systemu śledzenia fiksacji wzroku Cyber-Oko. Wykorzystując diody i kamerę podczerwieni wraz z dedykowanym oprogramowaniem Cyber-Oko, które pozwala na śledzenie punktu skupienia wzroku na ekranie. Każdej osobie biorącej udział w doświadczeniu pokazano...
-
Integrated safety and security analysis of hazardous plants and systems of critical infrastructure
PublikacjaThis article addresses an integrated safety and security analysis approach of hazardous industrial plants and systems of critical infrastructure. Nowadays due to new hazards that emerge there are opinions among experts that these issues require an integrated approach in life cycle, from the design concept, through the design and operation of the plant, to its decommissioning. It is proposed to start from an interesting methodology...
-
Security Information Sharing for the Polish Power System
PublikacjaThe Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...
-
INTEGRATED FUNCTIONAL SAFETY AND CYBERSECURITY ANALYSIS METHOD FOR SMART MANUFACTURING SYSTEMS
PublikacjaThis article addresses integrated functional safety and cybersecurity analysis with regard to: the generic functional safety standard IEC 61508 and the cyber security standard IEC 62443 concerning an industrial automation and control system (IACS). The objective is to mitigate the vulnerability of information technology (IT) and operational technology (OT) systems, and reduce relevant risks taking into account a set of fundamental...
-
Awareness evaluation of patients in vegetative state employing eye-gaze tracking system
PublikacjaApplication of eye-gaze tracking system to awareness evaluation is demonstrated. Hitherto awareness evaluation methods are presented. The assumptions of proposed method based on analysis of visual activity of patients in vegetative state are demonstrated. The eye-gaze tracking system ''Cyber-Eye'' developed at the Multimedia Systems Department employed to conducted experiments is presented. Research described in the paper indicates...
-
Implementing Virtual Engineering Objects (VEO) with the Set of Experience Knowledge Structure (SOEKS)
PublikacjaThis paper illustrates the idea of Virtual Engineering Object (VEO) powered by Set of Experience Knowledge Structure (SOEKS) and Decisional DNA (DDNA). A VEO is the knowledge representation of an engineering object, having embodiment of all its associated knowledge and experience within it. Moreover, VEO is a specialization of Cyber-Physical System (CPS) in terms of that its extension in knowledge gathering and reuse, whereas CPS...
-
Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management
PublikacjaThis article outlines an integrated functional safety and cybersecurity evaluation approach within a framework for business continuity management (BCM) in energy companies, including those using Industry 4.0 business and technical solutions. In such companies, information and communication technology (ICT), and industrial automation and control system (IACS) play important roles. Using advanced technologies in modern manufacturing...
-
Cross-domain applications of multimodal human-computer interfaces
PublikacjaDeveloped multimodal interfaces for education applications and for disabled people are presented, including interactive electronic whiteboard based on video image analysis, application for controlling computers with mouth gestures and audio interface for speech stretching for hearing impaired and stuttering people and intelligent pen allowing for diagnosing and ameliorating developmental dyslexia. The eye-gaze tracking system named...
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublikacjaThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
A Plan for Training Global Leaders in Cybersecurity
PublikacjaReferat prezentuje wizję globalnego uniwersytetu, który będzie kształcił potencjalnych liderów w obszarze globalnego cyber-bezpieczeństwa. Opisuje on profil absolwenta z uwzględnieniem kompetencji technicznych, organizacyjnych, psychologiczno-socjologicznych i etycznych, a następnie przedstawia drogę realizacji tej wizji z uwzględnieniem istniejących zasobów.
-
Rozprzestrzenianie się w podtorzu skutków katastrof kolejowych z udziałem materiałów niebezpiecznych
PublikacjaDuża część przewozów materiałów niebezpiecznych prowadzona jest koleją. W związku z tym bezpieczeństwo tych przewozów nabiera coraz większego znaczenia. Każda katastrofa z udziałem materiałów niebezpiecznych ma negatywny wpływ na uczestników tego zdarzenia oraz na otaczające środowisko, bowiem jej zasięg na ogół nie jest lokalny. Z tego wynika, że w przypadku zaistnienia katastrofy należy minimalizować jej skutki oraz w dalszych...
-
Zastosowanie wyłącznika bezpiecznikowego do formowania impulsu wielkiej mocy
PublikacjaW wielu układach fizycznych i technicznych konieczne jest wytwarzanie impulsów wielkiej mocy o krótkim czasie trwania (rzędu ułamków µs). Impulsy te uzyskuje się stosując układy formujące zasilane ze źródła impulsowego wielkiej mocy, o długim czasie trwania impulsu, rzędu kilkudziesięciu µs. Jednym z układów formujących jest bezpiecznik wyłącznikowy. W pracy metodą symulacyjną badano wpływ parametrów bezpiecznika wyłącznikowego...
-
CIP Security Awareness and Training: Standards and Practice
PublikacjaThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognised by international and national standardisation bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
CIP Security Awareness and Training: Standards and Practice
PublikacjaThese are critical infrastructure employees who have access to the critical cyber assets in the first place. This situation is well recognized by international and national standardization bodies which recommend security education, training and awareness as one of the key elements of critical infrastructure protection. In this chapter the standards are identified and their relevant areas are described. A practical implementation...
-
Multimodal human-computer interfaces based on advanced video and audio analysis
PublikacjaMultimodal interfaces development history is reviewed briefly in the introduction. Some applications of multimodal interfaces to education software for disabled people are presented. One of them, the LipMouse is a novel, vision-based human-computer interface that tracks user’s lip movements and detect lips gestures. A new approach to diagnosing Parkinson’s disease is also shown. The progression of the disease can be measured employing...
-
Safety integrity level verification for safety-related functions with security aspects
PublikacjaThe article is devoted some important issues of the functional safety analysis, in particular the safetyintegrity level (SIL) verification of safety functions to be implemented within the distributed controland protection systems with regard to cyber security aspects. The procedure for functional safety man-agement includes hazard identification, risk analysis and assessment, specification of overall safetyrequirements and definition...
-
Objectivization of Audio-Visual Correlation analysis
PublikacjaSimultaneous perception of audio and visual stimuli often causes the concealment or misrepresentation of information actually contained in these stimuli. Such effects are called the ''image proximity effect'' or the ''ventriloquism effect'' in literature. Until recently, most research carried out to understand their nature was based on subjective assessments. The Authors of this paper propose a methodology based on both subjective...
-
Multimodal human-computer interfaces based on advanced video and audio analysis
PublikacjaMultimodal interfaces development history is reviewed briefly in the introduction. Examples of applications of multimodal interfaces to education software and for the disabled people are presented, including interactive electronic whiteboard based on video image analysis, application for controlling computers with mouth gestures and the audio interface for speech stretching for hearing impaired and stuttering people. The Smart...
-
Prądy łożyskowe w układach napędowych z silnikami indukcyjnymi
PublikacjaW pracy przedstawiono problemy występujące w układach napędowych z silnikami indukcyjnymi zasilanymi z falownika napięcia. Zwrócono uwagę na rosnącą liczbę uszkodzeń silników w napędach przekształtnikowych. Wskazano przyczyny wynikające z charakteru zasilania przekształtnikowego silnika. Główną uwagę poświęcono prądowi łożyskowemu, który odpowiada za większość awarii maszyn. Przedstawiono rodzaje prądów łożyskowych, wyjaśniając...
-
Modelling the malware propagation in mobile computer devices
PublikacjaNowadays malware is a major threat to the security of cyber activities. The rapid develop- ment of the Internet and the progressive implementation of the Internet of Things (IoT) increase the security needs of networks. This research presents a theoretical model of malware propagation for mobile computer devices. It is based on the susceptible-exposed- infected-recovered-susceptible (SEIRS) epidemic model. The scheme is based on...
-
O strumieniu mocy w silniku lub w układzie napędowym
PublikacjaW silniku lub w układzie napędowym wielkość strumienia mocy rośnie w kierunku przeciwnym do kierunku przepływu mocy. Straty energetyczne i sprawność energetyczna silnika lub układu napędowego powinny być przedstawiane jako funkcje wielkości fizycznych niezależnych od strat. Takimi wielkościami są prędkość i obciążenie silnika. Jednakże obraz strumienia mocy w silniku lub w układzie napędowym jest przedstawiany w literaturze w formie...
-
Koncepcja platformy wymiany informacji o incydentach cyberbezpieczeństwa dla krajowego systemu elektroenergetycznego
PublikacjaArtykuł opisuje wybrane zagadnienia związane z cyberbezpieczeństwem w sektorze elektroenergetyki. Jednym z elementów zapewniania bezpieczeństwa sieci elektro-energetycznej jest efektywna wymiana informacji o incydentach bezpieczeństwa. W jej ramach wszystkie zaangażowane podmioty systemu elektroenergetycznego, tj.: elektrownie, operatorzy systemów przesyłowych, operatorzy systemów dystrybucyjnych, dostawcy rozwiązań bezpieczeństwa,...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublikacjaThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Standards on Cyber Security Assessment of Smart Grid
PublikacjaSecurity evaluation of communication systems in smart grid poses a great challenge to the developers and operators. In recent years many new smart grid standards were proposed, which paradoxically results in the difficulty in finding a relevant publication in this plethora of literature. This paper presents the results of a systematic analysis which aimed at addressing this issue by identifying standards that present sound security...
-
The EU's Cyber Security Strategy
Publikacja -
Integrated functional safety and cyber security analysis
PublikacjaThe chapter is devoted some important issues of the functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL)...
-
Disaster-resilient communication networks: Principles and best practices
PublikacjaCommunication network failures that are caused by disasters, such as hurricanes, arthquakes and cyber-attacks, can have significant economic and societal impact. To address this problem, the research community has been investigating approaches to network resilience for several years. However, aside from well-established techniques, many of these solutions have not found their way into operational...
-
Virtual Whiteboard: A gesture-controlled pen-free tool emulating school whiteboard
PublikacjaIn the paper the so-called Virtual Whiteboard is presented which may be an alternative solution for modern electronic whiteboards based on electronic pens and sensors. The presented tool enables the user to write, draw and handle whiteboard contents using his/her hands only. An additional equipment such as infrared diodes, infrared cameras or cyber gloves is not needed. The user's interaction with the Virtual Whiteboard computer...
-
Studies on the influence of β-cyclodextrin derivatives on the physical stability of famotidine
PublikacjaThe usage of Fourier transform infrared spectroscopy, near infrared spectroscopy, differential scanning calorimetry and microscopy is presented in this work focused on the exploration of the effect of CD on the physical stability of famotidine (FAM). The most significant information was achieved by analysis of the second derivatives ofnear infrared (NIR) spectra recorded. Changes in the shape of spectra derivatives allow...
-
The added value of using the HEPA PAT for physical activity policy monitoring: a four-country comparison
PublikacjaBackground Public policy is increasingly recognized as an important component of physical activity promotion. This paper reports on the current status of physical activity policy development and implementation in four European countries based on the Health-Enhancing Physical Activity Policy Audit Tool (HEPA PAT) developed by WHO. It compares the findings to previous studies and discusses the general utility of this tool and its...
-
Physical models in the education of architectural history
PublikacjaIn this article, the authors present the long tradition and common use of physical models in the process of teaching the history of architecture in higher education institutions. The research described in the article is focused on the use of physical models and mock-ups as stimulants during architectural history classes to support lectures and increase the learning capabilities of students. The authors also cover the general use...
-
Borders of Digital Art in the Context of the Information Society
PublikacjaThe article shows the relationship between the development of information technologies, the characteristics of the information society and digital art. The broad possibilities of the digital world related to recording, storing and processing data (cyber text, big data, smart services) and the creation of virtual worlds are pointed out. The influence of the development of information technologies on the character of the works of...
-
PHYSICAL MODELLING OF GEOTECHNICAL STRUCTURES IN PORTS AND OFFSHORE
PublikacjaThe physical modelling of subsoil behaviour and soil-structure interaction is essential for the proper design of offshore structures and port infrastructure. A brief introduction to such modelling of geoengineering problems is presented and some methods and experimental devices are described. The relationships between modelling scales are given. Some examples of penetration testing results in centrifuge and calibration chamber...
-
Methods for physical impairment constrained routing with selected protection in all-optical networks
PublikacjaIn this paper, we investigate the problem of survivable all-optical routing in WDM networks with physical impairments. One of the recent key issues in survivable optical network design refers to maximization of the ratio of routeable demands while keeping the overall network cost low. In WDM networks, this goal can be achieved by routing as many demands in all-optical way as possible. Based on the latest technical trends driven...
-
On structural physical approximations and entanglement breaking maps
PublikacjaVery recently, a conjecture saying that the so-called structural physical approximations (SPAs) to optimal positive maps (optimal entanglement witnesses) give entanglement breaking (EB) maps (separable states) has been posed (Korbicz et al 2008 Phys. Rev. A 78 062105). The main purpose of this contribution is to explore this subject. First, we extend the set of entanglement witnesses supporting the conjecture. Then, we ask whether...
-
A Hyperdense Semantic Domain for Discontinuous Behavior in Physical System Models
PublikacjaMultiple time models have been proposed for the formalization of hybrid dynamic system behavior. The superdense notion of time is a well-known time model for describing event-based systems where several events can occur simultaneously. Hyperreals provide a domain for defining the semantics of hybrid models that is elegantly aligned with first principles in physics. This paper discusses the value of both time models and shows how...
-
Physical Properties of the Noncentrosymmetric SuperconductorMg10Ir19B16
Publikacja -
The Physical Activity Environment Policy Index for monitoring government policies and actions to improve physical activity
PublikacjaBackground A multifaceted response, including government action, is essential to improve population levels of physical activity (PA). This article describes the development process of the ‘Physical Activity Environment Policy Index’ (PA-EPI) monitoring framework, a tool to assess government policies and actions for creating a healthy PA environment. Methods An iterative process was undertaken. This involved a review of policy...
-
A history of the physical and chemical stability of pharmaceuticals : a review
Publikacja: There is a great need for a broad range review of stability tests of active pharmaceutical ingredients (APIs) in comparison with current requirements contained in the pharmacopoeia. This review focuses on a pharmaceutical history of physical and chemical stability determination. Traditional knowledge must be considered in the context of physical stability, while new knowledge must be applied and acquired in terms of identification...
-
METHODS FOR THE IDENTIFICATION OF CYBER RISKS: AN ANALYSIS BASED ON PATENT DATA
Publikacja