Filtry
wszystkich: 1281
wybranych: 975
-
Katalog
- Publikacje 975 wyników po odfiltrowaniu
- Czasopisma 108 wyników po odfiltrowaniu
- Konferencje 80 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 31 wyników po odfiltrowaniu
- Projekty 8 wyników po odfiltrowaniu
- Kursy Online 16 wyników po odfiltrowaniu
- Dane Badawcze 62 wyników po odfiltrowaniu
Filtry wybranego katalogu
Wyniki wyszukiwania dla: SECURITY CONTROLS AND MEASURES
-
Adaptive system for recognition of sounds indicating threats to security of people and property employing parallel processing of audio data streams
PublikacjaA system for recognition of threatening acoustic events employing parallel processing on a supercomputing cluster is featured. The methods for detection, parameterization and classication of acoustic events are introduced. The recognition engine is based onthreshold-based detection with adaptive threshold and Support Vector Machine classifcation. Spectral, temporal and mel-frequency descriptors are used as signal features. The...
-
Warstwowa ocena epidemiologiczna architektury zakładów opiekuńczo-leczniczych i zakładów gieriatycznych = Layer based epidemiological quality assessment of architecture of care security and geriatric wards
PublikacjaW artykule opisano możliwość wykorzystania autorskiej metody warstwowej oceny epidemiologicznej (WOE) do oceny potencjalnego ryzyka zakażeń w obiektach przeznaczonych dla osób starszych. Materiał i metody: W celu weryfikacji możliwości użycia metody WOE do oceny zagrożeń w zakresie bezpieczeństwa epidemiologicznego środowiska zbudowanego poddano analizie dostępne źródła literatury związane z obowiązującymi w Polsce wymaganiami...
-
Fatigue and Professional Burnout in Police Officers and Firefighters
PublikacjaExcessive demands, work overload and the working time arrangements are an important cause of burnout and fatigue in employees. Specific working time arrangements are characteristic of the internal security services, such as police officers and firefighters. This applies to both the ordering of day and night shifts and the length of shifts. Depletion of personal resources is a common component for acute fatigue and burnout. However,...
-
Algorithms for processing and visualization of Critical Infrastructure security data as well as simulation and analysis of threats = Algorytmy przetwarzania i wizualizacji danych dotyczących bezpieczeństwa infrastruktur krytycznych oraz symulacji i analizy zagrożeń
PublikacjaRozprawa traktuje o algorytmach przetwarzania danych dotyczących różnego rodzaju zagrożeń, w szczególności wyników analiz ryzyka infrastruktur krytycznych, pozwalających na przestrzenną analizę tych danych w kontekście geograficznym za pomocą dedykowanego Systemu Informacji Przestrzennej. Prezentowane metody analizy zgrupowań Infrastruktur Krytycznych oraz propagacji ich zagrożeń wykorzystują wyniki syntetycznej analizy podatności...
-
High prevalence of Escherichia coli belonging to the B2+D phylogenetic group in inflammatory bowel disease
PublikacjaBACKGROUND: It is not clear which species of bacteria may be involved in inflammatory bowel disease (IBD). One way of determining which bacteria might be likely candidates is to use culture-independent methods to identify microorganisms that are present in diseased tissues but not in controls. AIMS: (1) To assess the diversity of microbial communities of biopsy tissue using culture-independent methods; (2) to culture the bacteria...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublikacjaThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Gender-Related Differences in Trimethylamine and Oxidative Blood Biomarkers in Cardiovascular Disease Patients
PublikacjaGender differences in the burden of cardiovascular disease (CVD) have been observed worldwide. In this study, plasmatic levels of trimethylamine (TMA) and blood oxidative biomarkers have been evaluated in 358 men (89 controls and 269 CVD patients) and 189 women (64 control and 125 CVD patients). The fluorescence technique was applied to determine erythrocyte membrane fluidity using 1,6-diphenyl-1,3,5-hexatriene (DPH) and Laurdan,...
-
Secure access control and information protection mechanisms in radio system for monitoring and acquisition of data from traffic enforcement cameras
PublikacjaThe study presents the architecture of the Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short: RSMAD), particularly concerning access control and protection of confidential data. RSMAD security structure will be discussed in relation to network security issues. Additionally, the paper presents the results of the work associated with the modelling of potential threats to system security.
-
Resource productivity and environmental degradation in EU-27 countries: context of material footprint
PublikacjaThis study explores the relationship between the resource productivity and environmental degradation in European Union-27 countries. This study tests this relationship in context of high, moderate, and low material footprint sub-samples; these samples are formed utilizing the expectation–maximization machine learning algorithm. Using the panel data set of EU-27 countries from 2000 to 2020, linear and non-linear autoregressive distributed...
-
Make lighting healthier
PublikacjaLife on Earth evolved in day-and-night cycles. Plants and animals, including insects such as the fruit fly, have a biological clock that controls their circadian rhythms — as the 2017 winners of the Nobel Prize in Physiology or Medicine showed. Now, humans’ increasing reliance on artificial lighting is changing those rhythms.
-
Evaluation of Professional Demands and Financial Reward Through the Perception of Police Managers
PublikacjaThe aim of the study was to examine the relationship between job demands and salary in the subjective perception of mid-level police managers. An occupational stress model in which effort spent on job demands are not balanced by the received reward, was adopted. The study comprised 51 police officers (4 women). The partial least squares method was used for the analysis, and the SmartPLS 2.0 program was applied. The income and...
-
Identification of Emotional States Using Phantom Miro M310 Camera
PublikacjaThe purpose of this paper is to present the possibilities associated with the use of remote sensing methods in identifying human emotional states, and to present the results of the research conducted by the authors in this field. The studies presented involved the use of advanced image analysis to identify areas on the human face that change their activity along with emotional expression. Most of the research carried out in laboratories...
-
Impact of Work on the Well-Being of Police Officers and Firefighters
PublikacjaWork is one of the most important spheres of human functioning and has a significant impact on individual overall well-being. The purpose of this study is to assess the positive and negative impact of the work of police officers and firefighters on their well-being in different spheres of life. In particular, the study examines the relationship between the type of occupation and the elements that generate a feeling of well-being,...
-
Review of Cybersecurity Assessment Methods: Applicability Perspective
PublikacjaCybersecurity assessments are crucial in building the assurance that vital cyberassets are effectively protected from threats. Multiple assessment methods have been proposed during the decades of the cybersecurity field. However, a systematic literature search described in this paper reveals that their reviews are practically missing. Thus, the primary objective of this research was to fulfil this gap by comprehensively identifying...
-
The Effectiveness of Basic Resuscitation Activities Carried out by Combat Paramedics of the Police, as Exemplified by Polish Counterterrorist Units
PublikacjaThe tasks carried out by Police officers are often accompanied by dangerous situations that threaten the life and health of the people involved, the police themselves, and bystanders. It concerns especially counter-terrorism police units whose activities are aimed at terrorists and particularly dangerous criminals, and their course is violent and aggressive. In conjunction with the inability to bring civilian rescue services into...
-
Psychosocial risks associated with the profession of train driver
PublikacjaExcellent competencies as well as a good physical and mental health are required in train drivers’ profession. Despite the changes in the structure of employment the train drivers above 46 years and job tenure longer than 30 years are the largest group. The generation gap is becoming more pronounced, and its fulfilment will not be easy. It is related not only to training of new personnel but also promotion of healthy work environment...
-
A Review of Standards with Cybersecurity Requirements for Smart Grid
PublikacjaAssuring cybersecurity of the smart grid is indispensable for the reliable operation of this new form of the electricity network. Experts agree that standardised solutions and practices should be applied in the first place. In recent years many new standards for smart grids have been published, which paradoxically results in the difficulty of finding a relevant publication in this plethora of literature. This paper presents results...
-
Clustering Context Items into User Trust Levels
PublikacjaAn innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy....
-
Data visualization of marine objects on digital maps
PublikacjaThe paper presents the implementation of two multithreaded applications for data visualization of marine objects written in C#, designed to run on operator consoles with 32-bit or 64-bit Windows 7 OS. The article describes the most important functionality and features of the developed C# .NET user controls for data visualization on digital maps and in the configurable tables.
-
Selected adipocytokines in patients with an incidentally discovered pheochromocytoma
PublikacjaBACKGROUND: Adipose tissue secretes many adipokines and cytokines, which may be an additional risk factor of cardiovascular and metabolic diseases in patients with an incidentally discovered pheochromocytoma (PHEO). The aim of the study was to investigate levels of selected adipocytokines in these patients. METHODS: This prospective study included 12 patients with an incidentally discovered PHEO and 18 healthy participants. In...
-
Folate/homocysteine metabolism and lung cancer risk among smokers
PublikacjaBackground: Folate and homocysteine are involved in DNA synthesis and methylation processes, which are deregulated during carcinogenesis. Objectives: The aim of this study was to assess the relationship between folate/homocysteine concentrations, the functional polymorphisms of folate/homocysteine genes and lung cancer risk among cigarette smokers. Study design: The study included 132 lung cancer patients and 396 controls from...
-
CARDIOVASCULAR RISK FACTORS AMONG POLISH EMPLOYEES OF UNIFORMED SERVICES
PublikacjaObjectives: Employees of uniformed services (EoUS) were screened for cardiovascular risk factors. Material and Methods: A total of 1138 EoUS (age M±SD 49.9±6.0 years) and 263 controls (age M±SD 54.4±9.7 years) under the care of the cardiology clinic in Gdańsk, Poland,were included in the study. Medical history and blood samples were collected, and a physical examination was performed. Ten-year cardiovascular risk of death was...
-
The methods of secure data transmission in the KNX system
PublikacjaThe article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.
-
Nonlinear FEM 2D failure onset prediction of composite shells based on 6-parameter shell theory
PublikacjaWithin the framework of the nonlinear 6-parameter shell theory with the drilling rotation and asymmetric stress measures, the modifications of Tsai-Wu and Hashin laminate failure initiation criteria are proposed. These improvements enable to perform first ply failure estimations taking into account the non-symmetric stress measures. In order to check the validity of the proposed criteria, finite element analyses are performed with...
-
Validation of a virtual test environment for C2X communication under radio jamming conditions
PublikacjaIn this paper, we propose a novel car-2-x communication security testing methodology in the physical layer of wireless systems. The approach is dedicated to automated testing of autonomous vehicles and it is essential for such complex systems operation, especially with regard to safety and security issues. It is based on scenario-driven testing in virtual and real test environments created from collected or simulated data. The...
-
Use of a wastewater recovery product (struvite) to enhance subtropical seagrass restoration
PublikacjaSeagrasses are in decline worldwide, and their restoration is relatively expensive and unsuccessful compared to other coastal systems. Fertilization can improve seagrass growth in restoration but can also release nutrients and pollute the surrounding ecosystem. A slow-release fertilizer may reduce excessive nutrient discharge while still providing resources to the seagrass's rhizosphere. In this study, struvite (magnesium ammonium...
-
Analiza danych osobowych przetwarzanych w systemach telekomunikacyjnych klasy IP PBX oraz metod ich anonimizacji za pomocą systemów SBC
PublikacjaOpisano wyniki realizacji pracy, dotyczącej analizy systemu telekomunikacyjnego, opartego na technologii VoIP, pod względem wymagań prawnych powstałych wraz z wejściem w życie przepisów Ogólnego Rozporządzenia o Ochronie Danych Osobowych (RODO). Przedstawiono wyniki analizy przykładowego systemu IP PBX Asterisk oraz wykorzystywanego w nim protokołu sygnalizacyjnego SIP, w kontekście przetwarzania danych osobowych, a także metody...
-
Role of quantitative chest perfusion computed tomography in detecting diabetic pulmonary microangiopathy
PublikacjaAims: Aimof the study was to determine the role of perfusion chest computed tomography(pCT) in evaluation of pulmonary diabetic angiopathy.Methods: 18 never-smoking patients (10 diabetic patients and 8 healthy controls) underwentchest high resolution CT (HRCT) and then pCT scanning. In both groups, blood tests,biochemical analysis, fibrinogen, HbA1c, spirometry, diffusion capacity for carbonmonoxide(DLCO) and body pletysmography...
-
SVC and power transformers controllers coordination
PublikacjaThe use of shunt compensators such as FACTS (for example SVC) in power systems gives possibility of fast and flexible control of voltage or reactive power. An efficient cooperation between a transformer and compensator connected to busbars, or transformer’s tertiary winding, requires a proper coordination of controls. The article contains theoretical considerations and simulation results which indicate that such co-ordination is...
-
Liquid residence time in vortex separators
PublikacjaCentrifugal force enhances gravitational separation of suspension (vortex separators), as well as allows regulation of liquid discharge (vortex flow controls). Furthermore, it elongates the effective residence time of liquid inside the chamber in comparison to non-circulative flow. Laboratorz measurements, described in the paper, indicate that average liquid residence time for circulative flow exceeds 50% of plug-flow time,...
-
Mechanizmy bezpieczeństwa transmisji w systemie netBaltic
Publikacjaartykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Feature extraction in detection and recognition of graphical objects
PublikacjaDetection and recognition of graphic objects in images are of great and growing importance in many areas, such as medical and industrial diagnostics, control systems in automation and robotics, or various types of security systems, including biometric security systems related to the recognition of the face or iris of the eye. In addition, there are all systems that facilitate the personal life of the blind people, visually impaired...
-
Architektura bezpieczeństwa systemu netBaltic
PublikacjaW artykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Results from a Genome-Wide Association Study (GWAS) in Mastocytosis Reveal New Gene Polymorphisms Associated with WHO Subgroups
PublikacjaMastocytosis is rare disease in which genetic predisposition is not fully understood. The aim of this study was to analyze associations between mastocytosis and single nucleotide polymorphisms (SNPs) by a genome-wide association study (GWAS) approach. A total of 234 patients were enrolled in our study, including 141 with cutaneous mastocytosis (CM; 78 children and 63 adults) and 93 with systemic mastocytosis (SM, all adults)....
-
Kontekstowo zorientowany model bezpieczeństwa systemów internetowych
PublikacjaW rozprawie dokonano analizy usługowych systemów internetowych pod względem bezpieczeństwa. Przedstawiono autorskie uniwersalne modele bezpieczeństwa CoRBAC oraz jego rozszerzenie TCoRBAC, będące rozwinięciem tradycyjnego modelu RBAC. Uwzględniono analizę szeroko rozumianego kontekstu funkcjonowania systemu oraz poziom jego zaufania do użytkownika. Opracowano metodę wyznaczania dwóch parametrów: zaufania do systemu (λ) będącego...
-
Simulating Malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
New RFID readers for scalable RFID system
PublikacjaRFID systems gives the opportunity to have wide access control integrated with the monitoring of people and goods flow. System's scalability is one of the most important features in such systems as they enable large scale deployments. The concept of the proposed reader's architecture employs new RFID transceivers and microcontrollers, security algorithms which gives very high functionality at low price. Special treatment of system's...
-
Conjectured strong complementary-correlations tradeoff
PublikacjaWe conjecture uncertainty relations that restrict correlations between the results of measurements performed by two separate parties on a shared quantum state. The first uncertainty relation bounds the sum of two mutual informations when one party measures a single observable and the other party measures one of two observables. The uncertainty relation does not follow from the Maassen-Uffink uncertainty relation and is much stronger...
-
Mechanizmy bezpieczeństwa w strefie C systemu netBaltic
PublikacjaW artykule zaprezentowano rozwiązania zaimplementowane do zabezpieczania komunikacji w warunkach sporadycznej i nieciągłej łączności (Delay Tolerant Networking – DTN) w systemie netBaltic - charakterystycznej dla strefy C tego systemu. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych, architektura bezpieczeństwa całego systemu została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI),...
-
Threat/risk assessment tool to assess vulnerability of Polish cities to Russian attacks
Publikacja -
Klasyfikacja wyrobów tytoniowych z wykorzystaniem elektronicznych nosów
PublikacjaZapobieganie nielegalnej dystrybucji wyrobów tytoniowych w Polsce stanowi poważny problem. Wyroby tytoniowe przemycane do Polski mogą charakteryzować się niższą jakością, wynikającą z wykorzystania surowców gorszego gatunku. Jednym z rozwiązań zmniejszających skalę tego problemu mogą być działania ograniczające przemyt przez granice państwa. Autorzy pracy uważają, że wykorzystanie elektronicznych nosów do rutynowych kontroli przewożonych...
-
Influence of the Spectral Quality of Light on Daytime Alertness Levels in Humans
PublikacjaExposure to light is very important for human health. However, the characteristics of the light stimulus and the appropriate timing of such exposure are essential. Studies that have used monochromatic light exposure have shown no systematic patterns for the effects of blue light compared to longer wavelengths. Previous studies have shown that red light exposure increases objective and subjective measures of alertness at night without...
-
WIKI-WS as a C2 NIWA Web Service Management Platform
PublikacjaThe Wiki-WS platform was implemented within the C2 NIWA project for production purposes. Wiki-WS stands for developing, managing and maintaining web services. The production deployment needed implementation of several functional improvements and establishing a strong security 7 safety policy. The WikiWS platform has to be used as an educational environmement for developing web sevices and production environment for execution of...
-
Supervisory fuzzy control system for biological processes in sequencing wastewater batch reactor
PublikacjaThe paper proposes the design of the supervisory heuristic fuzzy control system applied to a Sequencing Batch Reactor (SBR) in the Wastewater Treatment Plant (WWTP). Based on real data records and the biological process and aeration system models, a control system for biological processes has been designed. The supervisory control system performs management of the reactor work cycle, determines the phase length, controls the sludge...
-
Plasma free amino acid profiling as metabolomic diagnostic and prognostic biomarker in paediatric cancer patients: a follow‑up study
PublikacjaAmino acids (AAs) play a crucial role in cancer cell metabolism. Levels of 22 plasma AAs at the time of diagnosis and after treatment were established among 39 pediatric cancer patients and 33 healthy children. Glutamic acid levels decreased and tryptophan levels increased during treatment. Cancer patients presented significantly lower levels of glutamine and leucine post-treatment while levels of 12 other AAs were higher comparing...
-
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics
PublikacjaThe contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...
-
AUTONOMOUS PLATFORM TO PROTECT MARITIME INFRASTRUCTURE FACILITIES
PublikacjaProblems regarding the security of maritime infrastructure, especially harbours and offshore infrastructure, are currently a very hot topic. Due to these problems, there are some research projects in which the main goal is to decrease the gap and improve the methods of observation in the chosen area, for both in-air and underwater areas. The main goal of the paper is to show a new complex system for improving the security of the...
-
Simulation Environment in Python for Ship Encounter Situations
PublikacjaTo assess the risk of collision in radar navigation distance-based safety measures such as Distance at the Closest Point of Approach and Time to the Closest Point of Approach are most commonly used. Also Bow Crossing Range and Bow Crossing Time measures are good complement to the picture of the meeting situation. When ship safety domain is considered then Degree of Domain Violation and Time to Domain Violation can be applied. This...
-
Wykorzystanie miar dywergencji Csiszara do oecny podobieństwa struktury ludności krajów regionu Morza Bałtyckiego
PublikacjaStudies of socio-economic phenomena often touch on the issues concerning similarity between demographic structures. The measures usually used in the evaluation of structure similarity or in the investigation of the extent of structural changes are functions of distance metrics of their partial indicators. The study points out the possibility of using Csiszar divergence measures (f-divergences) in the quantification of the extent...