Filtry
wszystkich: 423
wybranych: 340
-
Katalog
Filtry wybranego katalogu
Wyniki wyszukiwania dla: INFORMATION SECURITY.
-
A Triplet-Learnt Coarse-to-Fine Reranking for Vehicle Re-identification
PublikacjaVehicle re-identification refers to the task of matching the same query vehicle across non-overlapping cameras and diverse viewpoints. Research interest on the field emerged with intelligent transportation systems and the necessity for public security maintenance. Compared to person, vehicle re-identification is more intricate, facing the challenges of lower intra-class and higher inter-class similarities. Motivated by deep...
-
Architecture of Request/Response and Publish/Subscribe System Capable of Processing Multimedia Streams
PublikacjaAnaliza ''w locie'' (ang. on-the-fly) strumieni multimedialnych, zawierających wysokiej jakości dane obrazu i dźwięku, wciąż stanowi wyzwanie dla projektantów oprogramowania. Praca przedstawia architekturę systemu zdolnego do przetwarzania w czasie rzeczywistym strumieni multimedialnych przy użyciu komponentów działających w architekturze Publish/Subscribe oraz Request/Response, korzystających z możliwości Java Multimedia Framework...
-
Implementation of integrated control In drinking water distribution systems - IT system proposal
PublikacjaImplementation of integrated control algorithms requires suitable hardware and software platforms. Proposed solution must allow realizing control and monitoring tasks, while ensuring high reliability and security of processed data. Additionally, the software and hardware solutions must be immune to outside influence. This paper presents an approach to implementation of control systems in drinking water distribution system. Presented...
-
Integrating web site services into application through user interface
PublikacjaThe issue of integrating applications which are only accessible through visual user interface is not thoroughly researched. Integration of web applications running remotely and controlled by separate organizations becomes even more complicated, as their user interface can display differently in different browsers or change without prior notification as a result of application maintenance. While possible, it is generally not common...
-
Federated Learning in Healthcare Industry: Mammography Case Study
PublikacjaThe paper focuses on the role of federated learning in a healthcare environment. The experimental setup involved different healthcare providers, each with their datasets. A comparison was made between training a deep learning model using traditional methods, where all the data is stored in one place, and using federated learning, where the data is distributed among the workers. The experiment aimed to identify possible challenges...
-
Efficient removal of 2,4,6-trinitrotoluene (TNT) from industrial/military wastewater using anodic oxidation on boron-doped diamond electrodes
PublikacjaWith growing public concern about water quality particular focus should be placed on organic micropollutants, which are harmful to the environment and people. Hence, the objective of this research is to enhance the security and resilience of water resources by developing an efficient system for reclaiming industrial/military wastewater and protecting recipients from the toxic and cancerogenic explosive compound – 2,4,6-trinitrotoluene...
-
Threshold Attendance under Soft-Crash Model: TAG Protocol and Markovian Analysis
PublikacjaA realistic and systematic network evaluation should subsume an availability model and a failure model. We combine a "hard availability" model we call threshold attendance, whereby a certain minimum number of network elements must be present at any time, with a soft-crash failure model, whereby after experiencing a failure, a network element is still able to function correctly for a while in an emergency mode at a risk of a major...
-
Flexicurity. Elastyczność i bezpieczeństwo
PublikacjaFlexicurity to koncepcja łącząca elastyczność (flexibility) oraz bezpieczeństwo (security) na rynku pracy. Dokumenty strategiczne Unii Europejskiej wskazują, że docelowo funkcjonowanie europejskich rynków pracy będzie bazowało na modelu flexicurity. Koncepcja flexicurity łączy w sobie, dwa pozornie sprzeczne, pojęcia elastyczności i bezpieczeństwa. Opracowanie stanowi przegląd dokumentów Unii Europejskiej oraz publikacji naukowych...
-
On extending open source IMS platform for integrated IPTV and VoIP services over IPv6
PublikacjaEven when IMS is the most popular platform for multimedia services, the open versions of IMS ecosystem are lacking in specified functionalities for IPTVv6 and VoIPv6 services. In this paper, we extend current client and server open source software in order to provide reliability and security to these multimedia services. As a part of our work the IMS architecture for conferencing system with proposed mechanisms to improve system...
-
Assembling and testing of quasi-static hybrid piezoelectric motor based on electroactive lubrication principle
PublikacjaThe presented paper concerns a novel concept of hybrid piezoelectric motor based on electroactive lubrication principle. Its structure is combined of quasi-static and resonance piezoelectric actuators, synchronizing their work to generate the rotary movement. The hybrid motor topology is compared to the existing piezoelectric motors, regarding its field of applications in embedded systems with very high security requirements. The...
-
Towards a process based management system for oil port infrastructure in context of insurance
PublikacjaThis article addresses selected methodological aspects of a process based management system based on analysis of hazards and threats and risk evaluation for an oil port infrastructure in context of insurance. The oil port terminal is regarded as important system of the critical infrastructure that require careful system oriented approach to deal with integrated aspects of environmental, safety and security management to reduce...
-
Procedure based proactive functional safety management for the risk mitigation of hazardous events in the oil port installations including insurance aspects
PublikacjaThis article addresses selected technical and organization aspects of risk mitigation in the oil port installations with regard to functional safety requirements specified in standards IEC 61508 and IEC 61511. The procedure for functional safety management includes the hazard identification, risk analysis and assessment, specification of overall safety requirements and definition of safety functions. Based on risk assessment results...
-
Architecture of Request/Response and Publish/Subscribe System Capable of Processing Multimedia Streams
PublikacjaAbstrakt Analiza ''w locie'' (ang. on-the-fly) strumieni multimedialnych, zawierających wysokiej jakości dane obrazu i dźwięku, wciąż stanowi wyzwanie dla projektantów oprogramowania. Praca przedstawia architekturę systemu zdolnego do przetwarzania w czasie rzeczywistym strumieni multimedialnych przy użyciu komponentów działających w architekturze Publish/Subscribe oraz Request/Response, korzystających z możliwości Java Multimedia...
-
Scanning networks with cactus topology
PublikacjaThe family of Pursuit and Evasion problems is widelystudied because of its numerous practical applications,ranging from communication protocols to cybernetic andphysical security. Calculating the search number of a graphis one of most commonly analyzed members of this problemfamily. The search number is the smallest number of mobileagents required to capture an invisible and arbitrarily fastfugitive, for instance piece of malicious...
-
Multi-functional sensor based on photonic crystal fiber using plasmonic material and magnetic fluid
PublikacjaA unique highly sensitive photonic crystal fiber is investigated based on plasmonic material and magnetic fluid (MF) for the simultaneous measurement of temperature and magnetic field sensor. The designed sensor is explored by tracing the different parameters such as birefringence, coupling length, power spectrum, and the peak wavelength of the transmission intensity. The magnetic field and temperature computation are attained...
-
Improved RSS-Based DoA Estimation Accuracy in Low-Profile ESPAR Antenna Using SVM Approach
PublikacjaIn this paper, we have shown how the overall performance of direction-of-arrival (DoA) estimation using lowprofile electronically steerable parasitic array radiator (ESPAR) antenna, which has been proposed for Internet of Things (IoT) applications, can significantly be improved when support vector machine (SVM) approach is applied. Because the SVM-based DoA estimation method used herein relies solely on received signal strength...
-
Ranking of Generation Source Locations by a Hybrid Multi-Criteria Method
PublikacjaThe paper presents a ranking of the locations of eight renewable energy sources (RES) made using a hybrid multi-criteria analysis method. The method is a combination of the analytical hierarchical process (AHP) method and numerical taxonomy. The considered generating sources, i.e. solar plants, biogas plants, and wind farms are sources that will significantly contribute to implementing the provisions of the energy and climate package...
-
LTE and NB-IoT Performance Estimation Based on Indicators Measured by the Radio Module
PublikacjaMonitoring the operating parameters of power grids is extremely important for their proper functioning as well as for ensuring the security of the entire infrastructure. As the idea of the Internet of Things becomes more ubiquitous, there are tools for monitoring the state of the complex electrical grid and means to control it. There are also developed new measuring devices and transmission technologies allowing for the transfer...
-
(Lost) Pride and Prejudice. Journalistic Identity Negotiation Versus the Automation of Content
PublikacjaThe objective of our research was to broaden the knowledge regarding the relationship between the work of journalists and their professional identity, and, in particular, to identify the attitudes of this professional group towards algorithmic content creation under conditions of liminality. Previously, the implementation of the technology of algorithmic content creation by media organisations was associated primarily with financial...
-
Searching for road deformations using mobile laser scanning
PublikacjaMillions of people use roads every day all over the world. Roads, like many other structures, have an estimated durability. In Poland a lot of the roads were built at the turn of the 20th and 21st c., especially for light cars. Many of these roads carry traffic and heavy goods vehicles which were not predicted when the traffic was first estimated. It creates a lot of problems with technical conditions and the infrastructure must...
-
Market Price Prediction of Property Rights from Gas Fired Plants or Plants with Total Installed CHP Source Capacity Below 1 MW until 2025
PublikacjaThe resolution on the Polish Energy Policy until 2030 (PEP-30) was adopted by the Council of Ministers on 10 November 2009. The document specifies the combined electricity and heat generation as a direction of pursuing the goals of energy efficiency, fuel and energy supply security, competitive fuel and energy markets development, and reduction of the energy sector’s environmental impact. PEP-30 assumes that electricity generation...
-
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
PublikacjaQuality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...
-
Performance and Security Testing of Distributed Applications Working in Public/Private IPSec and HTTPS Environments
PublikacjaW pracy przedstawiono zagadnienie testowania wydajności (ang. Performance) i bezpieczeństwa (ang. Security) aplikacji rozproszonych działających w sieciach publiczno-prywatnych stworzonych przy wykorzystaniu technologii IPSec i HTTPS. Dwa podejścia do architektury oprogramowania tych aplikacji zostały omówione: Request/Response oraz Publish/Subscribe. Analiza zawiera przedstawienie wpływu technologii IPSec i HTTPS na całkowitą...
-
Global energy transition: From the main determinants to economic challenges regions
PublikacjaDynamic global energy transition has been accelerating for the last decade. Interestingly, the energy transition is multidimensional and concerns both the dimensions of technique/ technology and the economic, social, institu-tional, and legal spheres (Shuguang et al., 2022; Tzeremes et al., 2022; Ram-zan et al., 2022; Tzeremes et al., 2022). The literature also points to the signif-icant impact of the digitization of the global...
-
A framework of open government data (OGD) e-service quality dimensions with future research agenda
PublikacjaPurpose This research paper aims to present a framework of open government data (OGD) relating to e-service quality dimensions. In addition, it provides a research agenda for the e-service delivery of OGD. Design/methodology/approach A literature review pertaining to e-service quality with special reference to e-government was delivered to deduce the key dimensions of e-service quality for OGD. Findings Five e-service quality dimensions...
-
Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
PublikacjaMultihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...
-
An Off-Body Narrowband and Ultra-Wide Band Channel Model for Body Area Networks in a Ferryboat Environment
PublikacjaIn the article an off-body narrowband and ultra-wide band channel model for body area networks in a ferryboat environment is described. Considering the limited number of publications there is a need to develop an off-body channel model, which will facilitate the design of radio links, both from the multimedia services provider and the security point of view, for body area networks in this atypical environment. A mobile heterogeneous...
-
New Challenges in Management and Economics in 21st century. Selected studies and examples
PublikacjaIn Chapter 1 authors describe the method used to assess the level of readiness of an organization to introduce the Lean Six Sigma concept supporting the Quality 4.0 assumptions, which is gaining more and more interest not only in large organizations, but also in the SME sector. Its use will be illustrated by the example of a small service company. Chapter 2 presents the characteristics of blockchain technology applications in the...
-
Society 4.0: Issues, Challenges, Approaches, and Enabling Technologies
PublikacjaThis guest edition of Cybernetics and Systems is a broadening continuation of our last year edition titled “Intelligence Augmentation and Amplification: Approaches, Tools, and Case Studies”. This time we cover research perspective extending towards what is known as Society 4.0. Bob de Vit brought the concept of Society 4.0 to life in his book “Society 4.0 – resolving eight key issues to build a citizens society”. From the Systems...
-
Chromatographic analyses of Lavandula angustifolia and Rosmarinus officinalis extracts and their biological effects in mammalian cells and cell-free systems
PublikacjaKnowledge of biological properties of natural compounds allows to understand their therapeutic value, efficacy and security. We investigated: composition of Lavandula angustifolia (LA) and Rosmarinus officinalis (RO) extracts, their antioxidant capacity, cytotoxicity and genotoxicity, their DNA-protective potential against DNA damage induced in hamster V79 cells by several genotoxins or in plasmid DNA by Fe2+ ions and activity...
-
Digital Public Service Innovation: Framework Proposal
PublikacjaThis paper proposes the Digital Public Service Innovation Framework that extends the "standard" provision of digital public services according to the emerging, enhanced, transactional and connected stages underpinning the United Nations Global e-Government Survey, with seven example "innovations" in digital public service delivery -- transparent, participatory, anticipatory, personalized, co-created, context-aware and context-smart....
-
Comparison and Analysis of Service Selection Algorithms
PublikacjaIn Service Oriented Architecture, applications are developed by integration of existing services in order to reduce development cost and time. The approach, however, requires algorithms that select appropriate services out of available, alternative ones. The selection process may consider both optimalization requirements, such as maximalization of performance, and constraint requirements, such minimal security or maximum development...
-
The investment process in the power supply industry
PublikacjaThe basis for power supply industry programming in a market economy should be the principle of sustainable development, which must take into account maintaining an adequate level of energy security on the one hand, and the aim to preserve the maximum degree of non-renewable resources on the other hand. Therefore, the overriding aim should be a strive to meet the current and prospective demand for energy and fuel, in conjugation...
-
CURRENT SITUATION ON THE POLAND REAL ESTATE MARKET
PublikacjaIn recent years the polish real estate market has been characterised by a significant increase in supply and demand. This was facilitated by a number of macroeconomic factors. In recent years, housing has been commissioned as 30 years ago. Therefore, the depth analysis issue of the causes and consequences for the Polish economy of these trends is now relevant. Among the reasons are significant economic growth, low interest rates...
-
An Automated Method for Biometric Handwritten Signature Authentication Employing Neural Networks
PublikacjaHandwriting biometrics applications in e-Security and e-Health are addressed in the course of the conducted research. An automated graphomotor analysis method for the dynamic electronic representation of the handwritten signature authentication was researched. The developed algorithms are based on dynamic analysis of electronically handwritten signatures employing neural networks. The signatures were acquired with the use of the...
-
Selection of an artificial pre-training neural network for the classification of inland vessels based on their images
PublikacjaArtificial neural networks (ANN) are the most commonly used algorithms for image classification problems. An image classifier takes an image or video as input and classifies it into one of the possible categories that it was trained to identify. They are applied in various areas such as security, defense, healthcare, biology, forensics, communication, etc. There is no need to create one’s own ANN because there are several pre-trained...
-
Automated Valuation Model based on fuzzy and rough set theory for real estate market with insufficient source data
PublikacjaObjective monitoring of the real estate value is a requirement to maintain balance, increase security and minimize the risk of a crisis in the financial and economic sector of every country. The valuation of real estate is usually considered from two points of view, i.e. individual valuation and mass appraisal. It is commonly believed that Automated Valuation Models (AVM) should be devoted to mass appraisal, which requires a large...
-
Using the Fingerprinting Method to Customize RTLS Based on the AoA Ranging Technique
PublikacjaReal-time Locating Systems (RTLSs) have the ability to precisely locate the position of things and people in real time. They are needed for security and emergency applications, but also for healthcare and home care appliances. The research aims for developing an analytical method to customize RTLSs, in order to improve localization performance in terms of precision. The proposed method is based on Angle of Arrival (AoA), a ranging...
-
Student Perspectives on the 2017 ESA Concurrent Engineering Challenge
PublikacjaIn September 2017, the first ESA Academy’s Concurrent Engineering Challenge (CEC) was held, giving 88 Master’s and PhD-level students from twelve ESA Member and Associate States a powerful platform to experience system engineering in an intense, fast paced, and real-world environment. Within four days, teams of physics and engineering students in Concurrent Design Facilities (CDF) located in Politecnico di Torino, Universidad Polit´ecnica...
-
Tracking of the broadband source of the underwater noise in the very shallow water conditions
PublikacjaThe paper contains the result s, both theoretical and experimental , connected with the tracking of the underwater noise source as small ships, pontoon , diver and so on. The pro blem of security in the shallow water area is the challenge for underwater acousticians. In this paper there is take n into account the detection of the sources that move on the surface of the sea or underwater in shallow...
-
The fast identification of explosives, natcotics and other chemicals carried on board of ships or transported in containers
PublikacjaThe fast identification of explosives, narcotics and other chemicals carried on board of ships or transported in containers to the harbors is an important problem of maritime security. Raman spectroscopy is an advanced technique used in state-of-the art laboratories for fast identification of chemicals. No sample preparation is required, and identification can be carried out through transparent packing, such as plastic or glass,...
-
BeesyBees: A mobile agent-based middleware for a reliable and secure execution of service-based workflow applications in BeesyCluster
PublikacjaIntegrating distributed services into workflows comes with its own set of challenges, including security, coordination, fault tolerance and optimisation of execution time. This paper presents an architecture and implementation - nicknamed BeesyBees - that allows distributed execution of workflow applications in BeesyCluster using agents. BeesyCluster is a middleware that allows users to access distributed resources as well as publish...
-
Damage Detection Strategies in Structural Health Monitoring of Overhead Power Transmission System
PublikacjaOverhead power transmission lines, their supporting towers, insulators and other elements create a highly distributed system that is vulnerable to damage. Typical damage scenarios cover cracking of foundation, breakage of insulators, loosening of rivets, as well as cracking and breakage of lines. Such scenarios may result from various factors: groundings, lightning strikes, floods, earthquakes, aeolian vibrations, conductors galloping,...
-
Oxygen vacancy-enriched V2O5·nH2O nanofibers ink for universal substrates-tolerant and multi means-integratable NH3 sensing
PublikacjaUniversal substrates-tolerant and multi means-integratable ammonia (NH3) sensing is highly desired in future Internet of Things in environmental monitoring, food security and early diagnosis of human diseases, however, is still less than satisfactory. Here, an oxygen vacancy-governed NH3 sensing has been developed with V2O5·nH2O nanofibers (NFs) ink, via combined thermal decomposition of ammonium metavanadate and dilution. As-obtained...
-
Privacy-Preserving, Scalable Blockchain-Based Solution for Monitoring Industrial Infrastructure in the Near Real-Time
PublikacjaThis paper proposes an improved monitoring and measuring system dedicated to industrial infrastructure. Our model achieves security of data by incorporating cryptographical methods and near real-time access by the use of virtual tree structure over records. The currently available blockchain networks are not very well adapted to tasks related to the continuous monitoring of the parameters of industrial installations. In the database...
-
Comparison of AHP and Numerical Taxonomy Methods Based on Biogas Plant Location Analysis
PublikacjaThe paper presents a comparison of the multi-criteria Analytic Hierarchy Process (AHP) method and numerical taxonomy in biogas plant location selection. Biogas plants are sources that will significantly contribute to the implementation of the provisions of the energy and climate package for Poland by 2030. Increasing the share of energy produced from renewable sources, e.g. biogas plants, will increase the country’s energy security....
-
Digital Innovations and Smart Solutions for Society And Economy: Pros and Cons
PublikacjaRecent developments in artificial intelligence (AI) may involve significant potential threats to personal data privacy, national security, and social and economic stability. AI-based solutions are often promoted as “intelligent” or “smart” because they are autonomous in optimizing various processes. Be-cause they can modify their behavior without human supervision by analyzing data from the environ-ment, AI-based systems may be...
-
Overview of Metamaterials-Integrated Antennas for Beam Manipulation Applications: The Two Decades of Progress
PublikacjaMetamaterials (MMs) are synthetic composite structures with superior properties not found in naturally occurring materials. MMs have gained massive attention over the last two decades because of their extraordinary properties, such as negative permittivity and permeability. These materials enable many applications in communication subsystems, especially in the field of antenna design, to enhance gain, bandwidth, and efficiency,...
-
Preferred Benchmarking Criteria for Systematic Taxonomy of Embedded Platforms (STEP) in Human System Interaction Systems
PublikacjaThe rate of progress in the field of Artificial Intelligence (AI) and Machine Learning (ML) has significantly increased over the past ten years and continues to accelerate. Since then, AI has made the leap from research case studies to real production ready applications. The significance of this growth cannot be undermined as it catalyzed the very nature of computing. Conventional platforms struggle to achieve greater performance...
-
Urban city lights. Light pollution as one of the effects of incorrectly designed external illumination. How can a successful lighting masterplan diminish its impact?
PublikacjaIn the modern world, artificial lighting brings many tangible benefits such as the ability to extend working hours and so increase production, recreational use of the city after dark, or the possibility to travel regardless of the time of day. However, this flexibility comes at a price and negatively impacts on the environment. One such negative phenomenon is Light Pollution ‐ a term used to describe excessive nighttime artificial...