Filtry
wszystkich: 26352
wybranych: 4028
-
Katalog
- Publikacje 4028 wyników po odfiltrowaniu
- Czasopisma 585 wyników po odfiltrowaniu
- Konferencje 262 wyników po odfiltrowaniu
- Wydawnictwa 2 wyników po odfiltrowaniu
- Osoby 516 wyników po odfiltrowaniu
- Wynalazki 1 wyników po odfiltrowaniu
- Projekty 23 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Kursy Online 130 wyników po odfiltrowaniu
- Wydarzenia 3 wyników po odfiltrowaniu
- Dane Badawcze 20801 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: INFORMATION%20SECURITY
-
Functional safety and security assessment of the control and protection systems
PublikacjaW artykule zostały poruszone kluczowe aspekty integracji podejścia bezpieczeństwa funkcjonalnego ''safety'' i ochrony informacji ''security'' w rozproszonych systemach sterowania i zabezpieczeniowych. Próba integracji zagadnień ''safety'' @ ''security'' została zilustrowana na przykładzie systemu monitoringu i zabezpieczeń pracującego w obiekcie podwyższonego ryzyka.
-
Uncertainty assessment in the safety and security oriented risk analyses
PublikacjaW artykule przedstawiono uwzględnienie oceny niepewności w procesie związanym z analizą ryzyka i analizą bezpieczeństwa oraz ochroną informacji. Przedstawiona została koncepcja oceny bezpieczeństwa i zarządzania ryzykiem z uwzględnieniem analizy warstw zabezpieczeń LOPA. W artykule nakreślono wyzwania związane z integracją podejścia oceny bezpieczeństwa (safety) i ochrony informacji (security) w projektowaniu systemów zabezpieczeń...
-
Safety and security governance problems of critical systems and infrastructures
PublikacjaW artykule przedstawiono kilka problemów związanych z zarządzaniem bezpieczeństwem i ochroną informacji w systemach i infrastrukturach krytycznych.Bardzo ważne jest zidentyfikowanie i scharakteryzowanie infrastruktury krytycznej. Przedstawiono nowe wyzwania związane z łączeniem podejścia bezpieczeństwa i ochrony informacji w procesie podejmowania decyzji
-
Integrated monitoring, control and security of Critical Infrastructure Systems
PublikacjaModern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...
-
Security Evaluation of IT Systems Underlying Critical Networked Infrastructures
PublikacjaCritical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...
-
Challenges in security and safety management of critical systems and infrastructures
PublikacjaReferat poświęcono aktualnym problemom zarządzania bezpieczeństwem systemów i infrastruktur krytycznych. Infrastruktury krytyczne szereguje się z uwzględnieniem kilku kryteriów. Zarysowuje się problematykę zarządzania podatnością obiektów podwyższonego ryzyka na działania z zewnątrz oraz zagadnienie analizy ryzyka na przykładzie systemu elektroenergetycznego. W końcowej części referatu opisuje się nowe wyzwania związane z zarządzaniem...
-
Selected Methods For Increases Reliability The Of Electronic Systems Security
Publikacja -
Supporting Compliance with Security Standards by Trust Case Templates
PublikacjaTrust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....
-
Managing the security vulnerabilities of critical systems and hazardous plants
PublikacjaRozdział poświęcono aktualnym problemom zarządzania ochroną obiektów podwyższonego ryzyka jako ważnych systemów infrastruktury krytycznej. Zarządzanie odpornością na ataki takich obiektów jest oparte na ocenach ryzyka. Podkreśla się, że występują ważne instalacje i systemy wymagające specjalnej uwagi i zabezpieczeń, szczególnie systemy kontroli dostępu do sterowni i urządzeń komunikacji. Opisuje się przykładowe technologie ochrony....
-
Anti-theft lab security system based on RFID
PublikacjaThe aim of the project is to design and create an electronic system, which can be used to protect laboratory equipment against theft. The main task of the system is to warn a person responsible for the facilities about any attempts made to steal equipment from a laboratory. In a case of an alarm situation, the system emits a sound signal. The concept of the anti-theft security system based on RFID was developed on the basis of...
-
ASSESSMENT OF FINANCIAL SECURITY OF AN ENTERPRISE ON THE BASIS OF BEHAVIORAL ECONOMICS
PublikacjaThe article substantiates that the level of company’s financial security depends not so much on the indicators of its activity, but on its perception of decision-makers and other stakeholders. At the same time, this perception is formed due to the continuous participation of the stakeholder in operations, constant monitoring of financial indicators, the study of current approaches to enterprise management, changes in the environment,...
-
Is Artificial Intelligence Ready to Assess an Enterprise’s Financial Security?
PublikacjaThis study contributes to the literature on financial security by highlighting the relevance of the perceptions and resulting professional judgment of stakeholders. Assessing a company’s financial security using only economic indicators—as suggested in the existing literature—would be inaccurate when undertaking a comprehensive study of financial security. Specifically, indices and indicators based on financial or managerial reporting...
-
Determining and verifying the safety integrity level with security aspects
PublikacjaSafety and security aspects consist of two different group of functional requirements for the control and protection systems. It is the reason why the analyses of safety and security shouldnt be integrated directly. The paper proposes extension of the currently used methods of functional safety analyses. It can be done with inclusion of the level of information security assigned to the technical system. The article addresses some...
-
Methodological issues of security vulnerability analysis and risk assessment
PublikacjaArtykuł przedstawia wybrane aspekty metodyczne związane z zarządzaniem bezpieczeństwem i ochroną instalacji podwyższonego ryzyka. Podkreślono, że występują instalacje podwyższonego ryzyka, które wymagają specjalnej uwagi w zarządzaniu bezpieczeństwem. Zaproponowano metodykę opartą na wiedzy do zintegrowanej analizy LOPA (warstw zabezpieczeń) i ROPA (pierścieni zabezpieczeń). Nadrzędnym celem jest opracowanie metod i narzędzi wspomagających...
-
Security-oriented agile approach with AgileSafe and OWASP ASVS
PublikacjaIn this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these...
-
Adapting Agile Practices to Security Context – Practitioners’ Perspective
PublikacjaIn this paper we explore the problem of introducing agile practices to projects dealing with systems with high security requirements. We also propose an approach based on AgileSafe method and OWASP ASVS guidelines, that could support such introduction. What is more, we present the results of two surveys aimed at analyzing IT practitioners’ views on applying agile methods to security reliant systems as well as evaluating the set...
-
Application of BAN Network to Increase Security in Transport Systems
PublikacjaIn the article general characteristics of the BAN network with M2M communications are presented. These are networks that enable the implementation of wireless transmission of signals using special sensors located on the body or implanted subcutaneously. These sensors allow monitoring of different type life parameters of a human. In the next part of work there is proposed the implementation of BAN networks to transport systems as...
-
Biofilm formation and its regulation in Staphylococcus aureus
PublikacjaInfections caused by the major human and animal pathogen, Staphylococcus aureus are becoming an important problem due to its emerging resistance mechanisms and variety of virulence factors. Biofilm formation is considered to be one of the most important factor attributed to high pathogenicity of S. aureus. Described in the literature methods used in identification of biofilm forming abilities of bacteria consist of phenotypic and...
-
Easy formation of acyl-Meldrum's acid anhydride
PublikacjaAcyl Meldrum's acid are usually a good source of ketenes upon definite thermal composition. However we treated acyl-Meldrum's acid with the Lewis acid and we observed formation of 5[[(2,2-dimethyl-4,6-dioxo-1,3-dioxan 5 ylidene)(acyl/arylamino)mathoxy](acyl/arylamino)methylene]-2,2dimethyl-1,3-dioxane-4,6 dione which means acyl-Meldrum's acid anhydride. The chemical properities of acyl-Meldrum's acid anhydride were explored.
-
Formation of carboxymethyl cellulose–casein complexes by electrosynthesis
Publikacja -
Fractal analysis and modelling of gas bubble formation.
PublikacjaPrzedstawiono wyniki badań eksperymentalnych generowania pęcherzyków powietrznych z dysz o różnej średnicy, umieszczonych pod powierzchnią wody. Sygnał rejestrowany przez układ laser-fotodioda poddano analizie fraktalnej.
-
Formation of wood surface roughness in burnishing process
PublikacjaW publikacji przedstawiono i omówiono rozwój bezwiórowych metod obróbki wykańczającej drewna przez nagniatanie. Przedstawiono wpływ nagniatania na chropowatość powierzchni drewna. Badania przeprowadzono na próbkach toczonych i nagniatanych. Wyniki odniesiono do głównych parametrów nagniatania jak: siła nagniatania oraz promień zaokrąglenia elementu nagniatającego.
-
Mechanism of hydroxyl radicals formation on the reduced rutile
Publikacja -
Formation of bubbles from a single nucleation site.
PublikacjaPrzedstawiono wyniki systematycznych badań eksperymentalnych wrzenia wody destylowanej i metanolu z pojedynczego, sztucznego centrum nukleacji. Jako centra nukleacji służyły otwory wywiercone na czołowej powierzchni miedzianego pręta. Średnice otworów wynosiły: 0.25 mm, 0.60 mm oraz 1.0 mm. Do pomiaru częstotliwości odrywania się pęcherzyków zastosowano układ laser diodowy-fotodioda. Sygnał z fotodiody był rejestrowany za...
-
Resonance Raman Study on Carbon Nanotubes Formation
Publikacja -
Urban dew formation efficiency and chemistry in Poland
PublikacjaThe measurements of dew formation efficiency and chemistry were performed in Poland in September 2009, as a part of a longer, two-year sampling campaign. Pairs of sites, representing centers of major Polish cities and rural conditions in three different regions, were compared. With the aim to get more detailed landuse-oriented characteristics of dew, two additional sites were set close to Wroclaw. Collection of dew at each site...
-
Dew Formation and Chemistry Near a Motorway in Poland
PublikacjaIn this study, the influence of traffic intensity on dewformation efficiency and chemistry is presented. The measurementswere conducted near the A4 motorway in SW Poland in almost flatland relief with intense agricultural activity. The dew/hoarfrost wascollected by means of insulated plain passive radiative condensersat three sites: AN and AS located in the close vicinity of themotorway (30 m) on the opposite sides of the road,...
-
Enthalpies of formation of rare earth niobates, RE3NbO7
PublikacjaHigh-temperature oxide melt solution calorimetry was used to investigate energetics of a series of rare earth niobates RE3NbO7. All of investigated compounds were found to be stable in enthalpy in respect to their oxides. The enthalpy of formation from oxides becomes more exothermic as the size of the RE cation increases, a trend seen previously in other RE compounds including pyrochlores, perovskites, and phosphates. For smaller...
-
Geographic Information System for Flood Hazard Analysis and Early Warning Using Numerical Weather Predictions
PublikacjaFloods are a phenomenon which causes significant losses of lives as well as property damage, which in turn severely impact the local economy. The nature of a flooding has been well researched, and several methods of flood hazard simulation have been established over the last decades. The current legislation in the European Union requires the Member States to create, maintain and update flood risk and hazard maps, as well as identify...
-
House dust as a source of analytical information on concentration of polybrominated diphenyl ethers (PBDEs) - first approach
PublikacjaPolybrominated diphenyl ethers (PBDEs), which are best recognized as flame retardants, were in 2001, by virtue of Stockholm Convention, listed in a group of Persistent Organic Compounds (POPs). Increasing concentration levels of PBDEs, reported in human tissues (e.g., blood, serum, breast milk, etc.) haverecently caught worldwide concern due to their potential tendency to disrupt thyroid hormones, neurobehavioral deficits and endocrine...
-
Conception of Interactive Information and Decision Support System for Urban and Industrial Air Quality Management: Extension
Publikacja -
Two-spinors, oscillator algebras, and qubits: aspects of manifestly covariant approach to relativistic quantum information
PublikacjaThe first part of the paper reviews applications of 2-spinor methods to relativistic qubits (analogies between tetrads in Minkowski space and 2-qubit states, qubits defined by means of null directions and their role for elimination of the Peres-Scudo-Terno phenomenon, advantages and disadvantages of relativistic polarization operators defined by the Pauli-Lubanski vector, manifestly covariant approach to unitary representations...
-
Digital divide - inequalities in level of implementation of new information and telecommunication technologies. Cross country study
PublikacjaTekst stanowi analizę nierówności stopnia wdrożenia oraz implementacji ICTs w różnych krajach świata. Autor szacuje wskaźnik GINI dla możliwych krajów świata.In the paper presented, the author considers few aspects of the so-called "digital divide". It is easily noticeable worldwide, that new information and communication technologies (ICTs) "possess" a great ability to spread, at high pace, among countries from all around the...
-
The Effects of the Anthropological Race, Gender and Location of Verbal-Pictorial Stimuli on the Usability of Visual Information Conveyance
Publikacja -
Analysis of the Multiple Attribute Decision Making Problem with Incomplete Information about Preferences among the Criteria
Publikacja -
Investigating relationship between particulate matter air concentrations and suicides using geographic information system
Publikacja -
The data exchange between smart glasses and healthcare information systems using the HL7 FHIR standard
PublikacjaIn this study we evaluated system architecture for the use of smart glasses as a viewer of information, as a source of medical data (vital sign measurements: temperature, pulse rate, and respiration rate), and as a filter of healthcare information. All activities were based on patient/device identification procedures using graphical markers or features based on visual appearance. The architecture and particular use cases were implemented...
-
BUILDING INFORMATION MODELING - ANALIZA ZAKRESU I STANU IMPLEMENTACJI W POLSKIEJ BRANŻY BUDOWLANEJ
PublikacjaProblematyka BIM (Building Information Modeling) jest obecnie tematem wielu publikacji naukowych, ale także przedmiotem działań podejmowanych przez uczestników szeroko pojętego procesu budowlanego. Liczne zalety i szanse płynące ze stosowania technologii BIM w kolejnych etapach cyklu życia obiektu budowlanego, należy rozpatrywać z punktu widzenia inwestora/zamawiającego, architekta, projektanta konstrukcji i instalacji, dewelopera,...
-
Implementation of spatial information for monitoring and analysis of the area around the port using laser scanning techniques
PublikacjaNowadays, maritime infrastructure is heavily exploited, which requires monitoring. The article presents the implementation of spatial information which are point clouds for monitoring and analysis of the area around the port (buildings and wharves). For this study, point clouds coming from terrestrial (TLS) and airborne laser scanning (ALS), each of them having different accuracy, were used. An important part of the analysis was...
-
The experimental investigations and modelling of trak work with the use of tamping machine's diagnostic informations
PublikacjaW pracy przedstawiono realizowany w Katedrze Inżynierii Kolejowej Politechniki Gdańskiej program badawczy, którego idea zasadza się na wykorzystaniu podbijarki torowej w zakresie diagnostyki toru kolejowego. Skupiono się głównie na dwóch aspektach związanych z torem bezstykowym, tj. na siłach podłużnych występujących w tokach szynowych oraz na oporach poprzecznych rusztu torowego związanych głównie ze stopniem ustabilizowania podsypki...
-
Secondary Thermal Deformation Characteristics of Stiffened Plate Exposed to Fire
Publikacja -
STUDENTS' PERCEPTION OF E-GRADING: INFORMATICS COURSE CASE STUDY
PublikacjaUsing computers for grading can simplify work for teachers. However it is a sensitive part of their work and must be performed carefully. More information is required on students' reception and opinions about e-grading. This paper is a case study of e-grading used in Informatics course and discusses results obtained from surveying the students after being graded by a teacher and a computer.
-
The influence of plastic deformation on the magnetoelastic properties of the CSN12021 grade steel
PublikacjaWłasności magnetosprężyste materiałów są silnie modyfikowane przez zmiany struktury dyslokacyjnej, które są wynikiem procesów deformacji plastycznej. Zmiany te mogą być wykorzystane jako podstawa do opracowania metody nieniszczącej oceny stopnia deformacji materiału.Jak dotychczas zaproponowane zostały różne metody, oparte na pomiarach pętli histerezy magnetycznej czy też natężenia magnetycznego efektu Barkhausena. Artykuł porównuje...
-
Structural organization of video informative systems on light-emitting diodes
Publikacja -
Mitochondrial D-loop informative SNPs in identification of dog’s breed
Publikacja -
Effect of mesh deformation on the accuracy of 3D FEM electromagnetic analysis
PublikacjaIn this paper, the accuracy of 3D FEM electromagnetic simulations in parametric analysis using mesh deformation techniques is discussed. Mesh deformation techniques allow one to preserve the mesh topology while the geometry is changed. It is shown that the application of mesh deformation can provide accurate simulation results even for very large deformations. On the other hand, it is also shown that the technique has to be used...
-
Large deformation finite element analysis of undrained pile installation
PublikacjaIn this paper, a numerical undrained analysis of pile jacking into the subsoil using Abaqus software suit has been presented. Two different approaches, including traditional Finite Element Method (FEM) and Arbitrary Lagrangian–Eulerian (ALE) formulation, were tested. In the first method, the soil was modelled as a two-phase medium and effective stress analysis was performed. In the second one (ALE), a single-phase medium was assumed...
-
Structured deformation of granular material in the state of active earth pressure
PublikacjaThe paper focuses on the ability of granular materials to undergo structured deformation by analysing the data from the retaining wall model tests and discrete element simulations. The structured deformation means the movement of a granular material which produces a stable, regular pattern of multiple shear bands. The paper's primary purpose is to study this kind of deformation for the selected data representing the state of active...
-
Settlement of a historic building due to seepage-induced soil deformation
PublikacjaThe research paper reviews issues associated with the impact of groundwater flow on soil characteristics and parameters, hence, the entire structure of a building set on it. Water seepage through the ground, building subsoil or structural elements of buildings made of soil affects the soil skeleton and may lead to changes in the arrangement of individual grains relative to each other, i.e., a modified soil structure. Soil solid...
-
The influence of the drying process on the deformation of the beech and oak wood samples
PublikacjaThe influence of the drying process conditions on the deformation of the beech and oak wood. The results of the deformation of beech wood (Fagus sylvatica L.) and oak wood (Quercus robur) after drying process are presented. The drying process was carried out in the same drying schedule for each wood species. During each of schedules 40 pieces of wood were dried. The samples were divided into two groups. The first group of tested...