Filtry
wszystkich: 2607
wybranych: 2122
-
Katalog
- Publikacje 2122 wyników po odfiltrowaniu
- Czasopisma 205 wyników po odfiltrowaniu
- Konferencje 82 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 100 wyników po odfiltrowaniu
- Wynalazki 1 wyników po odfiltrowaniu
- Projekty 15 wyników po odfiltrowaniu
- Aparatura Badawcza 1 wyników po odfiltrowaniu
- Kursy Online 46 wyników po odfiltrowaniu
- Wydarzenia 2 wyników po odfiltrowaniu
- Dane Badawcze 32 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: Maritime Safety and Security
-
Evaluating Security and Resilience of Critical Networked Infrastructures after Stuxnet
PublikacjaThe chapter presents the current configuration of the simulation environment for the evaluations of the security and resilience of critical networked infrastructures, which enables simulations of Stuxnet-like attacks. The configuration includes new features added to the MAlSim - Mobile Agent Malware Simulator after the advent of Stuxnet in reference to the experiments aiming at the security evaluation of a power plant which we...
-
SDN testbed for validation of cross-layer data-centric security policies
PublikacjaSoftware-defined networks offer a promising framework for the implementation of cross-layer data-centric security policies in military systems. An important aspect of the design process for such advanced security solutions is the thorough experimental assessment and validation of proposed technical concepts prior to their deployment in operational military systems. In this paper, we describe an OpenFlow-based testbed, which was...
-
New model of cooperation between logistics center and maritime container terminal
PublikacjaThe following article presents the innovative concept of logistics centers called “port-centric logistics”, which finds close co-operation with maritime container port. This concept can reduce the costs of logistics operations. In the first part the author focuses on describing the specifics of logistics centers. The following parts include characteristic of “port-centric logistics” concept. The last part of the paper contains...
-
Road Infrastructure Safety Management in Poland
PublikacjaThe objective of road safety infrastructure management is to ensure that when roads are planned, designed, built and used road risks can be identified, assessed and mitigated. Road transport safety is significantly less developed than that of rail, water and air transport. The average individual risk of being a fatality in relation to the distance covered is thirty times higher in road transport that in the other modes. This is...
-
Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments
Publikacja[Context] The goal of security is to protect digital assets, devices, and services from being disrupted, exploited or stolen by unauthorized users. It is also about having reliable information available at the right time. [Motivation] Since the inception in 2009 of the first cryptocurrency, few studies have been undertaken to analyze and review the state-of-the-art research and current developments with respect to the security...
-
Integrated monitoring, control and security of Critical Infrastructure Systems
PublikacjaModern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...
-
Security information sharing for smart grids: Developing the right data model
PublikacjaThe smart grid raises new security concerns which require novel solutions. It is commonly agreed that to protect the grid the effective collaboration and information sharing between the relevant stakeholders is prerequisite. Developing a security information sharing platform for the smart grid is a new research direction which poses several challenges related to the highly distributed and heterogeneous character of the grid. In...
-
Security of export transactions in the offer of leading banks on the Polish market
PublikacjaThe following article presents the so-called conditioned payment methods, i.e. instruments for securing export transactions, such as letter of credit, documentary collection, bank guarantees, factoring and forfaiting. The characteristics of each particular method are presented as well as the transactions using them are described. In the following paper, the author included also the leading Polish banks, which offer the above- mentioned...
-
Examination of fresh water chemistry in maritime Antarctica during austral summer 2017
PublikacjaDue to the fact that Antarctica is one of the least polluted places on Earth, it is a perfect place to observe the spread of global pollution. Therefore, research conducted on this continent is important due to the possibility of investigating the type of pollution and their way of transport. This work considers presence of organic contaminants in Maritime Antarctica in unexplored until now, Lions Rump headland. Qualitative and...
-
INCREASING THE COUNTRY'S SECURITY AND PUBLIC TRANSPORT ACCESSIBILITY BY CREATING A NETWORK OF SMALL AIRPORTS
PublikacjaIt has been shown that by creating a network of small airports, it is possible to increase the communication accessibility of large population groups and the country's security, including safety at sea. The airports mentioned above may also be located on land considered to be weak from an engineering point of view. These include, for example, wetlands, swamps, flood embankments, poor coastal belt grounds, and reclaimed land. A...
-
User Trust Levels and Their Impact on System Security and Usability
PublikacjaA multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.
-
On UMTS security.
PublikacjaW artykule zaprezentowano przegląd hipotetycznych ataków na sieci i systemy telekomunikacji ruchomej, w tym systemy UMTS. Uwzględniono: podsłuch, nieautoryzowany dostęp, celowe zakłócanie oraz ataki typu DoS. Zaprezentowano mechanizmy podnoszące bezpieczeństwo pracy UMTS, w szczególności wprowadzające identyfikację i ''rozwinięte'' uwierzytelnianie a także kompleksową autoryzację dostępu.
-
Review of Autonomous and Remotely Controlled Ships in Maritime Sector
Publikacja -
Fuzzy regresion approach to road safety analysis at regional level
PublikacjaRoad safety modelling on regional level of NUTS 2 in the EU is the complex issue and authors of this article indicate this in previous publications. NUTS 2 are basic regions for the application of regional policies (0.8-3 m inhabitants). During multivariate models development they discovered that it is difficult to make regression model well described all regions, even if they are from one country. In the first step Poisson model...
-
HEALTH SAFETY OF BREAD IN SMALL BAKERIES
PublikacjaThe aim of the article is to present the safety and health risks in the production process of bread, supported by research in small bakeries located in the Pomeranian Voivodeship. Health safety of bread is one of the features that decide its quality. This article additionally presents other determinants influencing the quality of bread. It also demonstrates opinions showing food safety as a separate attribute of quality. The paper...
-
Regional implementation of a road safety observatory in Poland
PublikacjaThe paper outlines the background and goals of the Road Safety Observatory in the Polish region of Warmia and Mazury. While created it was Poland’s first road safety Observatory, both at the regional and central level. Established in line with the methodology proposed in the European project SafetyNet, together with the planned National Road Safety Observatory it will form part of a Europe-wide network of observatories linked with...
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublikacjaAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Functional safety and human factors
PublikacjaRozdział przedstawia istotny problem uwzględnienia czynników ludzkich (H&OF) w analizie bezpieczeństwa funkcjonalnego, które wpływają istotnie na bezpieczeństwo przemysłowych obiektów podwyższonego ryzyka, nie ujęty jednak w normach bezpieczeństwa funkcjonalnego. Przedstawia się metody analizy niezawodności człowieka (HRA) w kontekście tych czynników, które wpływają na błędy człowieka. Czynniki ludzkie i organizacyjne powinny być...
-
The role of observatories in the integrated transport safety systems
PublikacjaAccurate knowledge about the causes, circumstances and place of transport accidents is the prerequisite to take the correct action to improve transport safety. Developing appropriate organizational structures, forms and methods of management and implementation of safety measures in the sectoral approach condition the success. Therefore, the Safety Information System is one of the integral areas of the Integrated Transport Safety...
-
Software modules and application layer's security structure of RSMAD
PublikacjaThe paper discusses the software modules of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The structure of the application layer of the system has also been analysed in details, including: purpose, structure and principles of operation of software modules constituting this system. In addition, the paper presents and discusses the structure of security of application layer...
-
Application of BAN Network to Increase Security in Transport Systems
PublikacjaIn the article general characteristics of the BAN network with M2M communications are presented. These are networks that enable the implementation of wireless transmission of signals using special sensors located on the body or implanted subcutaneously. These sensors allow monitoring of different type life parameters of a human. In the next part of work there is proposed the implementation of BAN networks to transport systems as...
-
Quality Model for Integrated Security Monitoring and Control in Water Distribution Systems
PublikacjaThis article addresses the problem of drinking water distribution system (DWDS) security in the terms of water quality which in the era of terrorist threat is of high importance to the public. The contribution of this paper is the development of the so called security module to extend a multi-species water quality model. This gives an insight to the situation in DWDS not only under normal operational conditions but also in case...
-
Road safety inspection as a tool for road safety management – the polish experience
PublikacjaIn Poland, road inspections were implemented in June 2014 on all national roads. Previously conducted traffic surveys mainly related to the technical condition of roads, signs and markings; other safety issues were overlooked. The main problem that occurs during inspection is an inspector’s subjective qualitative assessment which affects the classification of the sources of hazard on the road.. The paper presents an analysis of...
-
Safety assurance strategies for autonomous vehicles
PublikacjaAssuring safety of autonomous vehicles requires that the vehicle control system can perceive the situation in the environment and react to actions of other entities. One approach to vehicle safety assurance is based on the assumption that hazardous sequences of events should be identified during hazard analysis and then some means of hazard avoidance and mitigation, like barriers, should be designed and implemented. Another approach...
-
Safety at railway level crossings and Vision Zero
PublikacjaIn this work, safety analysis at the railway level crossings is presented using advanced mathematical modelling. Resistivity of track subgrade panels is taken into account. The analysis does not refer to the assessment of the current regulations. Specific cases of generalized dynamic system are considered by introducing operations S=Δ, S=P defined in space C(N) of real sequences. In this model, generalized discrete exponential...
-
Knowledge Safety – Insights from the SME Sector
PublikacjaPurpose: This paper aims to explore the topic of knowledge safety, defined as the state of knowledge being safe from loss, leakage, attrition, oblivion, waste or theft. The paper first presents a theoretical background and review of previous studies on knowledge loss and ways of overcoming it, and then illustrates the topic of knowledge safety with ten case studies from the small and medium-sized enterprises (SMEs) sector. Methodology:...
-
Tools for road infrastructure safety management in Poland
PublikacjaThe objective of road safety infrastructure management is to ensure that when roads are planned, designed, built and used road risks can be systematically identified, assessed, removed and mitigated. There are a number of approaches to road safety management. European Union Directive 2008/96/EC requires EU member states to use four basic tools of road safety infrastructure management. An overview of the methods in these countries...
-
Wireless Link Selection Methods for Maritime Communication Access Networks—A Deep Learning Approach
PublikacjaIn recent years, we have been witnessing a growing interest in the subject of communication at sea. One of the promising solutions to enable widespread access to data transmission capabilities in coastal waters is the possibility of employing an on-shore wireless access infrastructure. However, such an infrastructure is a heterogeneous one, managed by many independent operators and utilizing a number of different communication...
-
The effects of vehicle restraint systems on road safety
PublikacjaKey to understanding the needs and tools of road infrastructure management for preventing run-off-road crashes or minimising their consequences, is to identify the hazads and sources of hazards caused by wrong or improper use of road safety devices and identify errors in the desifn, structure, construction and operation of road safety devices. Studying such an extended scope of the problem required fieldwork and surveys with road...
-
Diagnostyka eksploatacyjna okrętowych silników spalinowych - tłokowych i turbinowych
PublikacjaW monografii przedstawiono wybrane zagadnienia diagnostyki technicznej silników spalinowych dużej mocy, zarówno tłokowych, jak i turbinowych, ukierunkowane na eksploatację okrętowych (i nie tylko) systemów energetycznych, w których występują tego typu silniki. W początkowej części opracowania zaproponowano koncepcję systemowego ujęcia diagnostyki eksploatacyjnej silników okrętowych w aspekcie obowiązujących standardów światowych...
-
Has EGNOS its own place in maritime navigation?
PublikacjaGNSS (in fact it usually means GPS) is at the moment the fundamental means of positioning for any variants of navigation. However some attributes of it can be not sufficient for every users or in some tasks, so there are any cases when this system needs support. From the mariner point of view pure GPS properties perfectly fulfils expectations of sailors at the open sea, however there are lot of cases, when accuracy of the system...
-
Supporting Compliance with Security Standards by Trust Case Templates
PublikacjaTrust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....
-
PV installations and the safety of residential buildings
PublikacjaThe dynamic development of the photovoltaic industry entails threats that have a direct impact on the safety of residential buildings. Appropriate design of a PV installation can be a challenge due to the multifaceted nature of this issue. The designer should take into account issues related to the selection of electrical parameters of the installation, adapting lightning and surge protection in accordance...
-
Enhancing Security of Advanced Metering Infrastructure by Introducing Threshold Attendance Protocol
PublikacjaThe industry pushes towards smart grid systems in order to resolve current limitations of the unidirectional legacy power grid infrastructure. By introducing Advanced Metering Infrastructure (AMI) as an integral part of the smart grid solution, the utility company obtains an invaluable tool to optimize its network, lower the operational costs, and improve quality of service. Unfortunately, introducing two-way communication poses...
-
Preliminary safety assessment of Polish interchanges
PublikacjaInterchanges are a key and the most complex element of a road infrastructure. The safety and functionality of interchanges determine the traffic conditions and safety of the entire road network. This applies particularly to motorways and express-ways, for which they are the only way to access and exchange traffic. A big problem in Poland is the lack of comprehensive tools for designers at individual stages of the design process....
-
Anti-theft lab security system based on RFID
PublikacjaThe aim of the project is to design and create an electronic system, which can be used to protect laboratory equipment against theft. The main task of the system is to warn a person responsible for the facilities about any attempts made to steal equipment from a laboratory. In a case of an alarm situation, the system emits a sound signal. The concept of the anti-theft security system based on RFID was developed on the basis of...
-
The Indicators Assessment of Safety and Functionality of Tram Loops
PublikacjaThe new requirements set for tram loops mean that all stakeholders' expectations regarding their safety and functionality change. This creates a need for new tools for tram loop assessment, which are important interchanges, especially for people living outside the city limits or on their outskirts. The aim of the authors ’research is to create a indicators for assessing the safety and functionality of tram loops. Therefore, the...
-
Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
PublikacjaSustainable operation of Critical Infrastructure Systems (CISs) is of a major concern to modern societies. Monitoring, control and security of such systems plays a key role in guaranteeing continuous, reliable and above all secure access to the resources provided by these systems. Development of adequate software and hardware structures, as well as algorithms to perform such functions cannot be done apart from the operational conditions...
-
Functional Safety Analysis including Human Factors
PublikacjaIn this paper selected aspects of human factors are discussed that should be taken into account during the design of safety-related functions for a complex hazardous installation and its protections. The layer of protection analysis (LOPA) methodology is used for simplified risk analysis based on defined accident scenarios. To control the risk the safety instrumented functions (SIFs) are identified and their safety integrity levels...
-
Functionality of road safety devices - identification and analysis of factors
PublikacjaRoad safety devices are designed to protect road users from the risk of injury or death. The principal type of restraint is the safety barrier. Deployed on sites with the highest risk of run-off-road accidents, safety barriers are mostly found on bridges, flyovers, central reservations, and on road edges which have fixed obstacles next to them. If properly designed and installed, safety barriers just as other road safety devices,...
-
Analysis and comparision of safety of children and adult passanger in car based on crash tests results
PublikacjaThis paper presents analysis and comparision of safety of children and adult passanger in car based on crash tests results. The car crash test with four dummies, including two car seats allowed a direct comparison of the security under the same conditions of children and passengers directly to the car seat. Analysis of acceleration and video from the test allows to understand the phenomena during the collision, the air bags influence,...
-
Application of the Regional Security Complex Theory for Security Analysis in the Persian Gulf
Publikacja -
Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm
PublikacjaWe consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...
-
Pedestrian safety management using the risk-based approach
PublikacjaThe paper presents a concept of a multi-level pedestrian safety management system. Three management levels are distinguished: strategic, tactical and operational. The basis for the proposed approach to pedestrian safety management is a risk-based method. In the approach the elements of behavioural and systemic theories were used, allowing for the development of a formalised and repeatable procedure integrating the phases of risk...
-
Security and knowledge management
PublikacjaOmówiono zagadnienia związane z problemami bezpieczeństwa w obszarach technologicznego wspomagania zarządzania wiedzą.
-
Security of Web Services
PublikacjaArtykuł przedstawia zagadnienia związane tematycznie z Web Services. W szczególności dotyczy problemów związanych z zapewniwniem poufności i integralności danych. Zdefiniowano model bezpieczeństwa Web Services integrujący trzy główne technologie: SOAP, UDDI, WSDL.
-
Functional safety analysis including human factors
PublikacjaThe article addresses selected aspects of human factors that should be taken into account during the design of safety-related functions for a complex hazardous installation and its protections. In such installations the layer of protection analysis (LOPA) methodology is often used for simplified risk analysis based on defined accident scenarios. To control the risk the safety instrumented functions (SIFs) are identified and their...
-
Concept of Multifactor Method and Non-Functional Requirements Solution to Increase Resilience through Functional Safety with Cybersecurity Analysis
PublikacjaIn the process of designing safety systems, an integrated approach in safety and cybersecurity analysis is necessary. The paper describes a new technique of increasing resilience through integrated analysis of functional safety and cybersecurity. It is a modeling methodology based on the combination of the multifactor method utilizing modified risk graphs, used previously for Safety Integrity Level (SIL) assessment, and the Non-Functional...
-
ROAD SAFETY MANAGEMENT TOOLS FOR COUNTRY STRATEGIC LEVEL
PublikacjaStrategic road safety programmes setting out long-term visions and road infrastructure development plans must be based on road safety forecasts and an understanding of the long-term impact of different measures on road safety. The objective of this paper is to discuss a concept of road safety management for an area of a selected country because there are no simple tools of road safety management for the development and implementation...
-
Cognition and Decisional Experience to Support Safety Management in Workplaces
PublikacjaHazards are present in all workplaces and can result in serious injuries, short and long-term illnesses, or death. In this context, management of safety is essential to ensure the occupational health of workers. Aiming to assist the safety management process, especially in industrial environments, a Cognitive Vision Platform for Hazard Control (CVP-HC) is proposed. This platform is a Cyber Physical system, capable of identifying...