Filtry
wszystkich: 1939
wybranych: 1385
-
Katalog
- Publikacje 1385 wyników po odfiltrowaniu
- Czasopisma 325 wyników po odfiltrowaniu
- Konferencje 81 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 84 wyników po odfiltrowaniu
- Projekty 12 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Kursy Online 33 wyników po odfiltrowaniu
- Wydarzenia 3 wyników po odfiltrowaniu
- Dane Badawcze 14 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: THREATS OF PUBLIC SECURITY
-
Threat intelligence platform for the energy sector
PublikacjaIn recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...
-
Mechanizmy bezpieczeństwa transmisji w systemie netBaltic
Publikacjaartykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Facilitating free travel in the Schengen area—A position paper by the European Association for Biometrics
PublikacjaDue to migration, terror-threats and the viral pandemic, various EU member states have re-established internal border control or even closed their borders. European Association for Biometrics (EAB), a non-profit organisation, solicited the views of its members on ways which biometric technologies and services may be used to help with re-establishing open borders within the Schengen area while at the same time mitigating any adverse...
-
Multi-Stage Video Analysis Framework
PublikacjaThe chapter is organized as follows. Section 2 presents the general structure of the proposed framework and a method of data exchange between system elements. Section 3 is describing the low-level analysis modules for detection and tracking of moving objects. In Section 4 we present the object classification module. Sections 5 and 6 describe specialized modules for detection and recognition of faces and license plates, respectively....
-
Mechanizmy bezpieczeństwa w strefie C systemu netBaltic
PublikacjaW artykule zaprezentowano rozwiązania zaimplementowane do zabezpieczania komunikacji w warunkach sporadycznej i nieciągłej łączności (Delay Tolerant Networking – DTN) w systemie netBaltic - charakterystycznej dla strefy C tego systemu. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych, architektura bezpieczeństwa całego systemu została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI),...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublikacjaThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
A framework for automatic detection of abandoned luggage in airport terminal
PublikacjaA framework for automatic detection of events in a video stream transmitted from a monitoring system is presented. The framework is based on the widely used background subtraction and object tracking algorithms. The authors elaborated an algorithm for detection of left and removed objects based on mor-phological processing and edge detection. The event detection algorithm collects and analyzes data of all the moving objects in...
-
In Situ Verification of Numerical Model of Water Hammer in Slurries
PublikacjaThis paper presents a numerical model of transient flow in a pressure slurry pipeline network with verification based on in situ measurements. The model, primarily verified in laboratory conditions, has been extended and applied to the case of a large and complex slurry pipeline network in Poland. In the model, the equivalent density concept was applied. In situ experiments were performed for various unsteady flow episodes, caused by...
-
Forecasting risks and challenges of digital innovations
PublikacjaForecasting and assessment of societal risks related to digital innovation systems and services is an urgent problem, because these solutions usually contain artificial intelligence algorithms which learn using data from the environment and modify their behaviour much beyond human control. Digital innovation solutions are increasingly deployed in transport, business and administrative domains, and therefore, if abused by a malicious...
-
The Impact of Ergonomic Guiding Principles on the Formation of Modern Monumental Art
PublikacjaCommemoration of historic events is now a commonplace phenomenon both in culture and in academic research. The phenomenon is linked to an increase in the representation of the visualisation of the past in public sphere, which in turn leads to reformulation of monumental art. Modern monuments are often spatial forms consisting both of sculpture installation and bigger constructions. In case of these realisations, the designers,...
-
Platforma KASKADA jako system zapewniania bezpieczeństwa poprzez masową analizę strumieni multimedialnych w czasie rzeczywistym
PublikacjaW artykule przedstawiono Platformę KASKADA rozumianą jako system przetwarzania danych cyfrowych i strumieni multimedialnych oraz stanowiącą ofertę usług wspomagających zapewnienie bezpieczeństwa publicznego, ocenę badań medycznych i ochronę własności intelektualnej. celem prowadzonych prac było stworzenie innowacyjnego systemu umozliwiajacego wydajną i masową analizę dokumentów cyfrowych i strumieni multimedialnych w czasie rzeczywistym...
-
Resolving conflicts in object tracking for automatic detection of events in video
PublikacjaW referacie przedstawiono algorytm rozwiązywania konfliktów w śledzeniu obiektów ruchomych. Proponowana metoda wykorzystuje predykcję stanu obiektu obliczaną przez filtry Kalmana oraz dopasowuje wykryte obiekty do struktur śledzących ich ruch na podstawie deskryptorów koloru i tekstury. Omówiono specyficzne sytuacje powodujące konflikty, takie jak rozdzielanie obiektów. Przedstawiono wyniki testów. Algorytm może być zastosowany...
-
HEALTH-AFFIRMING EVERYDAY LANDSCAPES IN SUSTAINABLE CITY. THEORIES AND TOOLS
PublikacjaAs cities and urban population continue to grow, causing serious threats to public health, the development of health-affirming urban landscapes becomes even more important topic than ever before. The purpose of this paper is to answer the question which qualities of urban landscape make it the health-affirming landscape. In the first part of the paper, a concept of health-affirming landscapes and a modern approach to sustainable...
-
HEALTH-AFFIRMING EVERYDAY LANDSCAPES IN SUSTAINABLE CITY. THEORIES AND TOOLS
PublikacjaAs cities and urban population continue to grow, causing serious threats to public health, the development of health-affirming urban landscapes becomes even more important topic than ever before. The purpose of this paper is to answer the question which qualities of urban landscape make it the health-affirming landscape. In the first part of the paper, a concept of health-affirming landscapes and a modern approach to sustainable...
-
Multimodal Surveillance Based Personal Protection System
PublikacjaA novel, multimodal approach for automatic detection of abduction of a protected individual, employing dedicated personal protection device and a city monitoring system is proposed and overviewed. The solution is based on combining four modalities (signals coming from: Bluetooth, fixed and PTZ cameras, thermal camera, acoustic sensors). The Bluetooth signal is used continuously to monitor the protected person presence, and in case...
-
Frequently updated noise threat maps created with use of supercomputing grid
PublikacjaAn innovative supercomputing grid services devoted to noise threat evaluation were presented. The services described in this paper concern two issues, first is related to the noise mapping, while the second one focuses on assessment of the noise dose and its influence on the human hearing system. The discussed services were developed within the PL-Grid Plus Infrastructure which accumulates Polish academic supercomputer centers....
-
Wireless systems of threats monitoring
PublikacjaThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Polish waterfront in the process of transformation: The case of Elbląg port city
PublikacjaThe topic of waterfront transformation is a vast and challenging issue, which in small and medium-sized cities is still unexplored. With growing global interest in the matter of regeneration of city-water relationship and increasing public awareness of the value of waterfront public spaces, actions to transform abandoned waterfront areas have been undertaken in many Polish port cities. City of Elbląg, located in northern Poland,...
-
Towards a process based management system for oil port infrastructure in context of insurance
PublikacjaThis article addresses selected methodological aspects of a process based management system based on analysis of hazards and threats and risk evaluation for an oil port infrastructure in context of insurance. The oil port terminal is regarded as important system of the critical infrastructure that require careful system oriented approach to deal with integrated aspects of environmental, safety and security management to reduce...
-
IDENTYFIKACJA CZYNNIKÓW WPŁYWAJĄCYCH NA BEZPIECZEŃSTWO EKSPLOATACJI STATKU NA ŚRÓDLĄDOWEJ DRODZE WODNEJ W DELCIE WISŁY
PublikacjaKażdego roku w Polsce, na śródlądowych drogach wodnych rejestrowane są przez Urzędy Żeglugi Śródlądowej, Państwową Straż Pożarną i Policję wypadki i incydenty, prowadzące zarówno do uszkodzenia infrastruktury jak i uszczerbku na zdrowiu. Poprawa poziomu bezpieczeństwa wymaga dogłębnej analizy i wyciągania wniosków z zaistniałych sytuacji awaryjnych. Istotną rzeczą jest identyfikacja i usystematyzowanie zagrożeń występujących w...
-
Analiza SWOT i analiza 5 sił Portera dla rynku podstawowej opieki medycznej na obszarze miasta Gdańska
PublikacjaIn recent years we have seen the dynamic development of medical services sector inPoland. Private health centres focus on aggressive development strategy. The role of primaryhealth care facilities, which provide services financed from public funds, declined. The purpose of article is to describe medical services market in Gdańsk, especially in Gdańsk-South district. Itincludes demographics, the number and characteristics...
-
Health Enhancing Physical Activity Policies in Poland: Findings from the HEPA PAT Survey
PublikacjaInsufficient physical activity (PA) is one of major risk factors for serious diseases and premature mortality worldwide. Public policies to enhance PA across society are recognized as an effective tool against the problem. This paper presents the results of a comprehensive assessment of national-level PA policy approach in Poland. A standardized survey of Word Health Organization named the Health-Enhancing Physical Activity Policy...
-
Biznesplan dla zakładu podstawowej opieki zdrowotnej o rozszerzonej działalności na obszarze dzielnicy Gdańsk-Południe
PublikacjaIn recent years we have seen the dynamic development of medical services sector in Poland. Private health centres focus on aggressive development strategy. The role of primaryhealth care facilities, which provide services financed from the public funds, declined.The purpose of the article is to present methods of strategic planning which allow toopen new healthcare entity. The next purpose is to make in practice...
-
A Triplet-Learnt Coarse-to-Fine Reranking for Vehicle Re-identification
PublikacjaVehicle re-identification refers to the task of matching the same query vehicle across non-overlapping cameras and diverse viewpoints. Research interest on the field emerged with intelligent transportation systems and the necessity for public security maintenance. Compared to person, vehicle re-identification is more intricate, facing the challenges of lower intra-class and higher inter-class similarities. Motivated by deep...
-
Algorithms of chemicals detection using raman spectra
PublikacjaRaman spectrometers are devices which enable fast and non-contact identification of examined chemicals. These devices utilize the Raman phenomenon to identify unknown and often illicit chemicals (e.g. drugs, explosives)without the necessity of their preparation. Now, Raman devices can be portable and therefore can be more widely used to improve security at public places. Unfortunately, Raman spectra measurements is a challenge...
-
Integrating web site services into application through user interface
PublikacjaThe issue of integrating applications which are only accessible through visual user interface is not thoroughly researched. Integration of web applications running remotely and controlled by separate organizations becomes even more complicated, as their user interface can display differently in different browsers or change without prior notification as a result of application maintenance. While possible, it is generally not common...
-
Efficient removal of 2,4,6-trinitrotoluene (TNT) from industrial/military wastewater using anodic oxidation on boron-doped diamond electrodes
PublikacjaWith growing public concern about water quality particular focus should be placed on organic micropollutants, which are harmful to the environment and people. Hence, the objective of this research is to enhance the security and resilience of water resources by developing an efficient system for reclaiming industrial/military wastewater and protecting recipients from the toxic and cancerogenic explosive compound – 2,4,6-trinitrotoluene...
-
SPECYFIKA OBLIGACJI ZAMIENNYCH EMITOWANYCH PRZEZ SPÓŁKI PUBLICZNE
PublikacjaUpublicznienie rynku instrumentów dłużnych przedsiębiorstw w Polsce umożliwiło spółkom bardziej efektywne pozyskiwanie środków finansowych poprzez zaciąganie długu u wierzycieli detalicznych, równolegle z istniejącą już możliwością pozyskiwania kapitałów własnych. Rynek ten otworzył także spółkom publicznym drogę do emisji obligacji zamiennych, które z kolei bez obecności instrumentów udziałowych emitenta na rynku publicznym, stają...
-
Testy platformy SAN dla sektora elektroenergetycznego
PublikacjaWspółczesna infrastruktura elektroenergetyczna jest narażona na zagrożenia związane z dużą liczbą nowych luk i słabo- ści architektonicznych wynikających z szerszego wykorzystania technologii informacyjnych i komunikacyjnych (ang. Information and Communication Technologies – ICT). Połączenie infrastruktury elektroenergetycznej z Internetem naraża ją na nowe rodzaje ataków, takie jak ataki typu APT (ang. Advanced Persistent Threats)...
-
A framework of open government data (OGD) e-service quality dimensions with future research agenda
PublikacjaPurpose This research paper aims to present a framework of open government data (OGD) relating to e-service quality dimensions. In addition, it provides a research agenda for the e-service delivery of OGD. Design/methodology/approach A literature review pertaining to e-service quality with special reference to e-government was delivered to deduce the key dimensions of e-service quality for OGD. Findings Five e-service quality dimensions...
-
Badanie sieci świadomości sytuacyjnej dla infrastruktury elektroenergetycznej
PublikacjaWspółczesne systemy elektroenergetyczne są narażone na nowe rodzaje zagrożeń. Są one spowodowane lukami w zabezpieczeniach oraz słabościami architektonicznymi związanymi z szerszym zastosowaniem technologii teleinformatycznych (ICT) w tych systemach. Połączenie sieci elektroenergetycznych z Internetem naraża je na nowego rodzaju niebezpieczeństwa, takie jak ataki APT (ang. Advanced Persistent Threats) lub rozproszona odmowa usługi...
-
Cost assessment of computer security activities
PublikacjaComprehensive cost-benefit analysis plays a crucial role in the decision-making process when it comes to investments in information security solutions. The cost of breaches needs to be analysed in the context of spending on protection measures. However, no methods exist that facilitate the quick and rough prediction of true expenditures on security protection systems. Rafal Leszczyna of Gdansk University of Technology presents...
-
Reshaping of Coastlines as the Beginning of Urban Structures Changes in North Poland
PublikacjaThis article discusses the problem of strategies concerning the processes of re-shaping the Baltic Sea southern coastline applied recently in North Poland. The undertaken research is an attempt to identify the relationship between the modifications of coastline forms and the positive changes of urban structures. It can be seen that these modifications are needed because of the problems of existing shoreline erosion. It can be also...
-
Practical Evaluation of Internet Systems' Security Mechanisms
PublikacjaA proposed Internet systems security layer with context-oriented security mechanisms reduces the risk associated with possible vulnerabilities. A metric of the system trust level is proposed, and then evaluated according to a university Internet system.
-
Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection
PublikacjaAs a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used method for identifying Android malware is signature-based detection. The drawback of this method, however, is that it is unable to detect unknown malware. As a consequence of this problem,...
-
Wireless Systems of Threats Monitoring
PublikacjaConcept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Wireless systems of threats monitoring
PublikacjaThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Distributed System For Noise Threat Evaluation Based On Psychoacoustic Measurements
PublikacjaAn innovative system designed for the continuous monitoring of acoustic climate of urban areas was presentedin the paper. The assessment of environmental threats is performed using online data, acquired through a grid ofengineered monitoring stations collecting comprehensive information about the acoustic climate of urban areas.The grid of proposed devices provides valuable data for the purpose of long and short time acoustic climateanalysis....
-
Possibilities for Developing Electromobility by Using Autonomously Powered Trolleybuses Based on the Example of Gdynia
PublikacjaTrolleybus transport refers to contemporary challenges related to a reduction in emissions of greenhouse gases and CO2 into the atmosphere formulated by international institutions, such as the United Nations, the Organisation for Security and Co-operation in Europe, or the European Union. Departure from fossil fuels in urban transport is one of the key challenges for the coming years. Trolleybuses are an important tool in this...
-
The effect of environmental turbulence on cyber security risk management and organizational resilience
PublikacjaEven though there is a plethora of research on the role of environmental turbulence in organizational performance in general, little attention has been paid to the effect of environmental turbulence on cyber security risk management and further - organizational resilience. Drawing on the resource-based view and contingency theory, this study investigates how technological and market turbulence influence organizational cyber security...
-
Public relations w społeczeństwie
PublikacjaW artykule stawiam tezę – powtarzając za „„Standardami profesjonalnych public relations”- o konieczności wysuwania na plan pierwszy - we wszelkich działaniach w obszarze public relations - ich zgodności z wartościami i normami etycznymi, ponieważ wszelkie działania public relations są nie tylko realizowane w przestrzeni społecznej, ale mają istotny wpływ na kształt, kondycję społeczeństwa, również na budowę demokracji i społeczeństwa...
-
Standardy Profesjonalnego Public Relations
Publikacja" Standardy przedstawiają wartości i pryncypia uzasadniające konieczność dokonywania odpowiednich wyborów. Public relations ma godzić interesy zleceniodawców, przedstawicieli mediów i różnych grup społeczeństwa, a przy tym pozostawać w zgodzie z normami etycznymi i odwoływać się do takich wartości jak szacunek, godność, rzetelność, uczciwość, prawda, wiarygodność, niezależność, lojalność i zaufanie. Opracowanie "Standardów profesjonalnego...
-
Calibration of acoustic vector sensor based on MEMS microphones for DOA estimation
PublikacjaA procedure of calibration of a custom 3D acoustic vector sensor (AVS) for the purpose of direction of arrival (DoA) estimation, is presented and validated in the paper. AVS devices working on a p-p principle may be constructed from standard pressure sensors and a signal processing system. However, in order to ensure accurate DoA estimation, each sensor needs to be calibrated. The proposed algorithm divides the calibration process...
-
Data Model Development for Security Information Sharing in Smart Grids
PublikacjaThe smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid, the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...
-
EVALUATION OF THE ENERGY SECURITY AS A COMPONENT OF NATIONAL SECURITY OF THE COUNTRY
Publikacja -
Operating system security by integrity checking and recovery using write-protected storage
PublikacjaThe paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...
-
External Security Strategies of Belarus
PublikacjaUnder President Lukashenko, three Belarusian national security strategies have been announced: the first in 1995, the second in 2001 and the third in 2011. The first proposal, formulated after Lukashenko’s victory in the presidential elections in 1994, outlined Belarus as a neutral state, unbound to any military block in the absence of external enemies. The direction of the foreign policy pursued by the president of Belarus was...
-
Ukraine’s Energy Security in Strategies
PublikacjaDuring the independence period, the Ukrainian government has published two energy security strategies. The first strategy was adopted in 2006 and the second one in 2016. Both documents provided a similar definition of energy security. The aims of the first strategy, covering the period 2006–2030, were the restructuring of the fuel and energy complex using new technologies, increase of energy efficiency and ensuring market prices...
-
Security Mechanisms in the Comcute System
PublikacjaThe aim of this paper is pointing out the basic security problems and mechanisms in the Comcute system - maintenance system of large computing power in the face of critical crisis. Moreover security mechanism and tools useful to apply in laboratory model as well as target version of the Comcute system are presented.
-
Graph security testing
PublikacjaSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...