Filtry
wszystkich: 873
wybranych: 571
Wyniki wyszukiwania dla: TRAFFIC REMAPPING ATTACK
-
Applicability of null-steering for spoofing mitigation in civilian GPS
PublikacjaCivilian GPS signals are currently used in many critical applications, such as precise timing for power grids and telecommunication networks. Spoofing may cause their improper functioning. It is a threat which emerges with the growing availability of GPS constellation simulators and other devices which may be used to perform such attack. Development of the effective countermeasures, covering detection and mitigation, is necessary...
-
Theory and implementation of a virtualisation level Future Internet defence in depth architecture
PublikacjaAn EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...
-
Pedestrian and bicycle bridges as examples of safe collision-free road crossings
PublikacjaPedestrians are most at risk when they are crossing the road. This represents a significant proportion of all fatalities among pedestrians, amounting respectively to 50% in non-built-up areas and 75% in built-up areas. The most frequent reason for this accident is failure to give way. What is most terrible is that 30% of pedestrian accidents occurred at marked pedestrian crossings. Therefore, an important part of pedestrian safety...
-
Mobile indicators in GIS and GPS positioning accuracy in cities
PublikacjaThe publication describes the possible use of tele-geoprocessing as a synergy of modern IT solutions, telecommunications and GIS algorithms. The paper presents a possibility of urban traffic monitoring with the use of mobile GIS indicators of dedicated monitoring system designed for taxi corporation. The system is based on a stationary and mobile software package. The optimal and minimal assumptions for the monitoring of urban...
-
Design of Resilient Vehicle-to-Infrastructure Systems
PublikacjaVehicular ad hoc networks (VANETs) have recently gained noticeable attention due to advantages in improving road traffic safety, shaping the road traffic and providing infotainment opportunities to travellers. However, transmission characteristics following from the IEEE 802.11p standard and the high mobility of VANET nodes remarkably reduce the lifetime, reach and capacity of wireless links, and often lead to simultaneous disruptions...
-
Study of QoS Parameters Measurement Methodology and Requirements in RSMAD
PublikacjaThe paper presents the results of analysis and research of the quality of service requirements (defined by the QoS parameters) for data transmission services in Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short: RSMAD). The paper also presents and discusses the results of test of impact of the size of images from traffic enforcement cameras (TECs) on the average transmission time. Moreover,...
-
Preliminary safety assessment of Polish interchanges
PublikacjaInterchanges are a key and the most complex element of a road infrastructure. The safety and functionality of interchanges determine the traffic conditions and safety of the entire road network. This applies particularly to motorways and express-ways, for which they are the only way to access and exchange traffic. A big problem in Poland is the lack of comprehensive tools for designers at individual stages of the design process....
-
Accuracy of Differential Phase Delay Estimation for GPS Spoofing Detection
PublikacjaGPS spoofing is an attack based on transmission of false signals to target receivers, in order to force the computation of incorrect time, position or velocity information. It is a threat which is recently considered with continuously growing awareness. There is a need for effective way of GPS spoofing detection. Many groups of methods are proposed in the literature. Spatial processing methods are considered to be robust in a wide...
-
Heart and mind in public transport: Analysis of motives, satisfaction and psychological correlates of public transportation usage in the Gdańsk–Sopot–Gdynia Tricity Agglomeration in Poland
Publikacja -
Analysis of positioning methods using Global Navigation Satellite Systems (GNSS) in Polish State Railways (PKP)
PublikacjaEach year, global navigation satellite systems (GNSS) improve their accuracy, availability, continuity, integrity, and reliability. Due to these continual improvements, the systems are increasingly used in various modes of transport, including rail transport, the subject of this publication. GNSS are used for rail passenger information, rail traffic management, and rail traffic control. These applications differ in the positioning...
-
Evaluating the convenience and safety effects of bicycle lanes in Gdańsk
PublikacjaBicycle lanes are lanes marked on a road and dedicated for exclusive use for cyclists.. Because they combine bike and motor traffic they provide directness and flow. However, a shared use of streets could result in bicycle-car accidents. Following up on the good practice Western countries have in planning cycle infrastructure, Gdańsk has recently introduced bike lanes on a few streets. The aim of the research was to assess the...
-
High temperature corrosion of evaporator tubes with thermal sprayed coatings
PublikacjaDegradation examinations of outer surface of low-emission steam boiler evaporator tubes are presented in the paper. Metallographic evaluation of scale morphology, its micro sites chemical composition analysis and distribution of elements on cross sections have been performed. Water-wall tubes were exposed in steam boiler for up to two years period. Common tubes made of 16Mo3 steel suffered sulphide and molten salts corrosions....
-
Approach to security assessment of critical infrastructures' information systems
PublikacjaThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Disappearing Bridge
PublikacjaThe main parts of the Hafen City’s residential development are still under construction. Close by, uninviting offi ce buildings defi ne Hammerbrook. Neighboring Rothenburgsort is inhabited by many citizens but lacks cultural attractions. Street traffic and water barriers distinctly separate the districts.
-
Analysis of effect of overloaded vehicles on fatigue life of flexible pavements based on weigh in motion (WIM) data
PublikacjaOverloaded vehicles have a significant impact on pavement fatigue life and distress. As the studies show, the phenomena intensify when the control of traffic is poor. The paper presents the results of the research including analysis of weigh in motion data from eight stations and analysis of asphalt pavement fatigue caused by mixed traffic. Distributions of vehicles axles load including the multiple axles effects are presented....
-
Protection in elastic optical networks
PublikacjaIn this article, we analyze gains resulting from the use of EON architectures with special focus on transportation of cloud-ready and content-oriented traffic in the context of network resilience. EONs are a promising approach for future optical transport networks and, apart from improving the network spectral efficiency, bring such new capabilities as squeezed protection, which reduces resource requirements in failure scenarios....
-
Call processing performance in multidomain IMS/NGN architecture
PublikacjaThe Next Generation Network (NGN) architecture, which bases on the IP Multimedia Subsystem (IMS) concept, is a proposition of a telecommunication network dedicated to the needs of the modern information society. The main goal of NGN is to provide Quality of Service (QoS), for which proper network design and dimensioning are necessary. This also requires appropriate traffic models, which should be efficient and not excessively complicated...
-
Universities as Part of the Urban Transport System—Analysis Using the Example of the Gdansk University of Technology and Medical University of Gdansk
PublikacjaMany cities perceive academic function as a distinctive feature, representing the rank and prestige of the city. Universities provide places for work and learning for a high number of people and represent a significant proportion compared to the total city population (even 22%). Many of Polish universities are located in the urban structure in the form of spatially concentrated campuses, where the number of people working and studying...
-
Optimization of the efficiency of braking energy recovery in rail transport by changing arrival time
PublikacjaThe article refers to the previous work of the authors, in which the model of traffic organization of cooperating trains including the optimization of the use of energy returned to the catenary was presented. In the presented article, the model was modified by changing the main control variable, which affects the efficient use of energy. Departure time was changed for the arrival time of the train to the stop or station. The optimization...
-
Determination of equivalent axle load factors with the use of strain energy of distortion
PublikacjaThe paper proposes a new method for calculation of equivalent axle load factors based on the analysis of strain energy of distortion induced in road pavements by traffic loads. The main advantage of the method is the more accurate calculation of the effects of multiple axles and super single versus dual tyres. The methodconsiders the location of critical points, at which strain energy of distortion reaches extreme values. When...
-
A novel approach exploiting properties of convolutional neural networks for vessel movement anomaly detection and classification
PublikacjaThe article concerns the automation of vessel movement anomaly detection for maritime and coastal traffic safety services. Deep Learning techniques, specifically Convolutional Neural Networks (CNNs), were used to solve this problem. Three variants of the datasets, containing samples of vessel traffic routes in relation to the prohibited area in the form of a grayscale image, were generated. 1458 convolutional neural networks with...
-
Acoustic evaluation of road surfaces using different Close Proximity testing devices
PublikacjaAccording to the valid standard, Close Proximity (CPX) method intends to evaluate the influence of road surfaces on traffic noise. Measurements may be carried out with the use of a self-powered vehicle or a special test trailer equipped with testing tyre towed by another vehicle. Two different testing devices took part in the research organized in Poland in order to determine the ranking of road surfaces in terms of acoustic parameters....
-
Analiza czynników wpływających na prędkość pojazdów transportu zbiorowego na przykładzie Gdańska
PublikacjaW referacie przedstawiono istotę problemu szacowania prędkości pojazdów transportu zbiorowego w szczególności w zakresie modelowania ruchu. Przedstawiono i omówiono wyniki przeprowadzonych w maju ubiegłego roku pomiarów czasu przejazdu pojazdów transportu zbiorowego na obszarze Gdańska w ramach budowy systemu sterowania ruchem TRISTAR. Otrzymane wyniki zestawiono w celu zaprezentowania statystyki oraz zidentyfikowania czynników...
-
Excavation induced cast iron pipeline failure – a numerical study
PublikacjaNumerical study on impact of an unsecured excavation on an underground pipeline. Analysis focused on investigation of pipeline displacement generated by soil movement caused by excavation and heavy traffic. Numerical calculations and soil parameter sensitivity analysis based on Finite Element Method. Some comparisons of results with real-life failure cases.
-
Study of Multi-Class Classification Algorithms’ Performance on Highly Imbalanced Network Intrusion Datasets
PublikacjaThis paper is devoted to the problem of class imbalance in machine learning, focusing on the intrusion detection of rare classes in computer networks. The problem of class imbalance occurs when one class heavily outnumbers examples from the other classes. In this paper, we are particularly interested in classifiers, as pattern recognition and anomaly detection could be solved as a classification problem. As still a major part of...
-
Analiza ruchu drogowego z wykorzystaniem analizy akustycznej
PublikacjaTematyka pracy porusza zagadnienia dotyczące pozyskiwania informacji o ruchu drogowym z wykorzystaniem monitoringu akustycznego. Przybliżono podstawowe techniki nadzoru nad ruchem drogowym. Przedstawiono założenia akustycznego detektora ruchu i zbadano jego skuteczność na trzech płaszczyznach działania – zliczania pojazdów, klasyfikacji rodzajowej i klasyfikacji warunków pogodowych panujących na nawierzchni
-
Technical diagnostics and monitoring of traction current collectors
PublikacjaNew evaluation methods of the technical condition of rolling stock current collectors are proposed in this paper. The method of automatic measurement of the pantograph static force characteristic, realized when the vehicle runs through the test section of the track with especially prepared overhead line height distribution, has been practically implemented by the Polish Railways. The method of testing the slipper spring suspension...
-
CFFT columns in road through railroad crossings
PublikacjaThere were 12801 road through railroad one-level crossings in Poland in 2018. 215 accidents happened at them in 2018. In order to increase safety in rail and road traffic two-level crossings should be used. They are definitely safer and make the traffic more smooth. In the design and construction of two-level intersections of railway and road or path columns of circular cross-section are often used. They can be successfully replaced...
-
Vehicle detector training with labels derived from background subtraction algorithms in video surveillance
PublikacjaVehicle detection in video from a miniature station- ary closed-circuit television (CCTV) camera is discussed in the paper. The camera provides one of components of the intelligent road sign developed in the project concerning the traffic control with the use of autonomous devices being developed. Modern Convolutional Neural Network (CNN) based detectors need big data input, usually demanding their manual labeling. In the presented...
-
Acoustic Detector of Road Vehicles Based on Sound Intensity
PublikacjaA method of detecting and counting road vehicles using an acoustic sensor placed by the road is presented. The sensor measures sound intensity in two directions: parallel and perpendicular to the road. The sound intensity analysis performs acoustic event detection. A normalized position of the sound source is tracked and used to determine if the detected event is related to a moving vehicle and to establish the direction of movement....
-
Organizacja ruchu pociągów w obrębie stacji a oszczędność energii
PublikacjaW artykule przytoczono podstawowe zasady organizacji ruchu kolejowego. Wyodrębniono elementy sieci kolejowej oraz wskazano obszar stacji kolejowej jako najistotniejszy z punktu widzenia organi-zacji ruchu dla celów zmniejszenia zużycia energii trakcyjnej z uwzględnieniem rekuperowanej ener-gii. W dalszej części odwołano się do spotykanych w literaturze rozwiązań sterowania czasem posto-ju na stacji oraz sterowania czasem jazdy...
-
Practical issues for the implementation of survivability and recovery techniques in optical networks
PublikacjaFailures in optical networks are inevitable. They may occur during work being done for the maintenance of other infrastructures, or on a larger scale as the result of an attack or large-scale disaster. As a result, service availability, an important aspect of Quality of Service (QoS), is often degraded. Appropriate fault recovery techniques are thus crucial to meet the requirements set by the Service Level Agreements (SLAs) between...
-
Explainable AI for Inspecting Adversarial Attacks on Deep Neural Networks
PublikacjaDeep Neural Networks (DNN) are state of the art algorithms for image classification. Although significant achievements and perspectives, deep neural networks and accompanying learning algorithms have some important challenges to tackle. However, it appears that it is relatively easy to attack and fool with well-designed input samples called adversarial examples. Adversarial perturba-tions are unnoticeable for humans. Such attacks...
-
A Multi-Antenna Scheme for Early Detection and Mitigation of Intermediate GNSS Spoofing
PublikacjaThis article presents a method for detecting and mitigating intermediate GNSS spoofing. In this type of attack, at its early stage, a spoofer transmits counterfeit signals which have slight time offsets compared to true signals arriving from satellites. The anti-spoofing method proposed in this article fuses antenna array processing techniques with a multipath detection algorithm. The latter is necessary to separate highly correlated...
-
Enzymatic activities behind degradation of glucosinolates
PublikacjaMyrosinase (thioglucosidase, EC 3.2.1.147) is the enzyme responsible for the hydrolysis of glucosinolates (GLs). In plant tissue, myrosinase and GLs are sequestered in separate cellular compartments. As a result of cell disruption, e.g., after pathogen attack or on chopping or grinding during food preparation, the myrosinase comes into contact with GLs and catalyzes the hydrolysis of thioglucosidic bond in GL structure. Consequently,...
-
Trustworthiness and Subversion in Large Service- Oriented Multi-Agent Systems under Virtual Anonymity and Blind Provider Selection
PublikacjaTo promote honest service provision in multi-agent systems, a Computational Trustworthiness and Rating scheme collects service ratings and computes agents' trustworthiness levels (TLs). Studies of existing schemes fail to reflect closed-loop dynamics of TLs arising from the mutual influence of agents' behavior and TLs, and to capture relevant properties. Recent simulative and analytical models produce results tied to a particular...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublikacjaThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Jakość usług w optycznej sieci wielodomenowej z hierarchiczną strukturą płaszczyzn sterowania
PublikacjaW rozprawie przedstawiono przegląd architektur sieci z gwarancją jakości klas usług oraz stan prac w zakresie realizacji optycznych sieci ASON, GMPLS oraz ASON/GMPLS. Opisano wymagania i zaawansowanie prac w realizacji sieci ASON/GMPLS z hierarchiczną strukturą płaszczyzn sterowania oraz problemy związane z zagadnieniem jakości klas usług w tej sieci. Zaprezentowano założenia, koncepcję oraz realizację modelu symulacyjnego optycznej...
-
Akustyczna analiza natężenia ruchu drogowego dla systemów zarządzania ruchem
PublikacjaW pracy przybliżono wybrane zagadnienia z dziedziny zarządzania transportem drogowym w Polsce i na świecie. W tym kontekście pzredstawiono potrzeby rynkowe, wymagania jak i możliwości w zakresie pozyskiwania informacji o aktualnym stanie sieci drogowych. Zaproponowano akustyczną metodę nadzorowania ruchu drogowego i jej możliwości w kontekście systemów zarządzania ruchem. Przedstawiono schemat akwizycji sygnału wraz z danymi odniesienia....
-
Vehicular Communication Environments
PublikacjaCommunication to and between road vehicles (cars, truck, buses, trains, etc.) are of growing interest. This is partly due to the attractive services that cooperative intelligent transport systems (C-ITSs) provides, mainly in the areas of traffic safety and traffic efficiency. An enabler for C-ITS is wireless vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication, collectively referred to as vehicle-to-X (V2X)...
-
Modulo N Backoff Scheme for effective QoS differentiation and increased bandwidth utilization in IEEE 802.11 networks
PublikacjaThe paper presents a new "modulo N" channel access scheme for wireless Local Area Networks (WLANs). The novel solution derives from the Distributed Coordination Function (DCF) of the IEEE 802.11 standard, further elaborated as Enhanced Distribution Channel Access (EDCA) by the 802.11e draft specification. The main innovation concerns improvement of the binary exponential backoff scheme used for collision avoidance in 802.11 networks....
-
Quality Parameters in IMS/NGN Networks
PublikacjaThe Next Generation Network (NGN) architecture, including elements of the IP Multimedia Subsystem (IMS) concept, is a proposition of a telecommunication network dedicated to the needs of current and future information society. The main goal of NGN is to provide Quality of Service (QoS), for which proper network design is necessary with respect to among others standardized call processing performance parameters, including expected...
-
Vehicle Detection with Self-Training for Adaptative Video Processing Embedded Platform
PublikacjaTraffic monitoring from closed-circuit television (CCTV) cameras on embedded systems is the subject of the performed experiments. Solving this problem encounters difficulties related to the hardware limitations, and possible camera placement in various positions which affects the system performance. To satisfy the hardware requirements, vehicle detection is performed using a lightweight Convolutional Neural Network (CNN), named...
-
Modelowanie reorganizacji ruchu w transporcie szynowym zwiększające efektywne wykorzystanie energii z hamowania odzyskowego
PublikacjaWe wstępie artykułu przedstawiono metody wykorzystania energii elektrycznej odzyskanej w procesie hamowania elektrodynamicznego. Szczególną uwagę zwrócono na metodę zwrotu odzyskanej energii do sieci jezdnej i wykorzystania jej przez inne pojazdy szynowe, której efektywne zastosowanie niejednokrotnie wymaga reorganizacji ruchu. W pracy przeanalizowano opisany w literaturze model organizacji ruchu w transporcie szynowym, który uwzględnia...
-
Quality Model for Integrated Security Monitoring and Control in Water Distribution Systems
PublikacjaThis article addresses the problem of drinking water distribution system (DWDS) security in the terms of water quality which in the era of terrorist threat is of high importance to the public. The contribution of this paper is the development of the so called security module to extend a multi-species water quality model. This gives an insight to the situation in DWDS not only under normal operational conditions but also in case...
-
Graph security testing
PublikacjaSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
Optimal shape design of multi-element trawl-doors using local surrogate models
PublikacjaTrawl-doors have a large influence on the fuel consumption of fishing vessels. Design and optimiza-tion of trawl-doors using computational models are a key factor in minimizing the fuel consump-tion. This paper presents an optimization algorithm for the shape design of trawl-door shapes using computational fluid dynamic (CFD) models. Accurate CFD models are computationally expensive. Therefore, the direct use of traditional optimization...
-
Multisine impedimetric monitoring with an in-depth distribution of relaxation times analysis of WE43 and AZ31 magnesium alloys corrosion
PublikacjaThis research aims to develop and utilize an impedance-based tool for monitoring non-stationary electrochemical processes, coupling the multisinusoidal perturbation signal approach and distribution of relaxation times (DRT) analysis for the first time. The approach was used to distinguish independent processes occurring at the surface of AZ31 and WE43 Mg alloys undergoing corrosion in Hank’s Balanced Salt Solution at 37 °C. We...
-
TEST FOR ASSESSING THE ENERGY EFFICIENCY OF VEHICLES WITH INTERNAL COMBUSTION ENGINES
PublikacjaThe most popular method for assessing the energy efficiency of vehicles is to compare the fuel consumption achieved in the conditions of selected approval test. Operating conditions are defined using the speed profiles, usually for only two categories: urban and extra-urban driving. Assessing the energy efficiency of vehicles should be performed using a more detailed classification of conditions. Presented results of comparison...
-
Travel Time of Public Transport Vehicles Estimation
PublikacjaEffective prediction of speed is central to advanced traveler information and transportation management systems. The speed of public transport vehicles is affected by many external factors including traffic volume, organization and infrastructure. The literature presents methods for estimating travel time on sections of a transport network and vehicle arrival at stops, often making use of the AVL (automatic vehicle location). The...