Filtry
wszystkich: 1281
wybranych: 975
-
Katalog
- Publikacje 975 wyników po odfiltrowaniu
- Czasopisma 108 wyników po odfiltrowaniu
- Konferencje 80 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 31 wyników po odfiltrowaniu
- Projekty 8 wyników po odfiltrowaniu
- Kursy Online 16 wyników po odfiltrowaniu
- Dane Badawcze 62 wyników po odfiltrowaniu
Filtry wybranego katalogu
Wyniki wyszukiwania dla: SECURITY CONTROLS AND MEASURES
-
Pedestrian Safety at Midblock Crossings on Dual Carriageway Roads in Polish Cities
PublikacjaRoad crossings across two or more lanes in one direction are particularly dangerous due to limited sight distance and high vehicle speeds. To improve their safety, road authorities should provide safety treatments. These may include additional measures to reduce speed and narrow the road cross-section and the introduction of active pedestrian crossings. Equipped with flashing lights activated automatically when a pedestrian is...
-
Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment
PublikacjaThe smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...
-
Signatures and acoustic images of objects moving in water
PublikacjaObservation of underwater space is part of a generaltrend, which primary purpose is to protect and increasesafety in the selected area. The basic aim of the paper ispresentation of designated acoustic characteristics typicalfor objects moving on the water surface and under water,which represent some knowledge about detection of theseobjects. Create a catalog of acoustic signature and not onlyacoustic, as well as acoustic images...
-
Remote current measurement with FPGA digital processing
PublikacjaThe work presents an implementation of a modular measurement and control systemthat controls variants of mains supply of 230V electrical equipment. The system allowsto supervise power consumption in the office electronic equipment. The system detectsthe instant of the reduced power consumption by a device and makes possible itsswitch-off in order to reduce energy cost. The current is measured with integratedcurrent/voltage converters....
-
Space and spatial practices in times of confinement. Evidence from three European countries: Austria, France and Poland
PublikacjaIn the first half of 2020, millions of people were subjected to drastic restrictions aimed at limiting the spread of the Covid-19 disease. Austria, France and Poland have implemented a lockdown to varying degrees and for varying lengths of time. This is an unprecedented situation in Europe: until now, even in times of war, curfew measures have never been applied 24 h a day. The research presented in this article was carried out...
-
Recommendations for Urban Freight Policy Development in Gdynia
PublikacjaThe purpose of this paper was to provide practical recommendations on how to develop Gdynia’s urban freight policy based on actual planning experience and characteristics of potential measures. Freight policy scheme was developed as a result of three interrelated factors: a) the general procedure of the urban freight planning, b) the city's current planning stage analysis and, c) characteristics of urban freight objectives and...
-
Selecting cost-effective risk control option for advanced maritime operations; Integration of STPA-BN-Influence diagram
PublikacjaAdvanced maritime operations, such as remote pilotage, are vulnerable to new emergent risks due to increased system complexity and a multitude of interactions. Thus, maritime researchers this decade have combined Systems-Theoretic Process Analysis (STPA) and Bayesian Network (BN) to effectively manage these risks. Although these methods are effective in identifying hazards and analyzing risk levels, none of the STPA-BN studies...
-
Koncepcja platformy wymiany informacji o incydentach cyberbezpieczeństwa dla krajowego systemu elektroenergetycznego
PublikacjaArtykuł opisuje wybrane zagadnienia związane z cyberbezpieczeństwem w sektorze elektroenergetyki. Jednym z elementów zapewniania bezpieczeństwa sieci elektro-energetycznej jest efektywna wymiana informacji o incydentach bezpieczeństwa. W jej ramach wszystkie zaangażowane podmioty systemu elektroenergetycznego, tj.: elektrownie, operatorzy systemów przesyłowych, operatorzy systemów dystrybucyjnych, dostawcy rozwiązań bezpieczeństwa,...
-
Wyzwania bezpieczeństwa nowoczesnych platform nauczania zdalnego
PublikacjaW artykule zaprezentowano aspekty bezpieczeństwa nowoczesnych platform nauczania zdalnego. Przedstawiono ich charakterystykę i wyzwania technologiczne. Zdefiniowano bezpieczeństwo i istniejące w tym obszarze zagrożenia. Przybliżono metody oceny poziomu bezpieczeństwa. Na bazie wdrożonej na Politechnice Gdańskiej platformy eNauczanie PG omówiono sposoby zapewniania zakładanego poziomu bezpieczeństwa takich systemów.
-
Progressive failure analysis of laminates in the framework of 6-field nonlinear shell theory
PublikacjaThe paper presents the model of progressive failure analysis of laminates incorporated into the 6-field non-linear shell theory with non-symmetrical strain measures of Cosserat type. Such a theory is specially recommended in the analysis of shells with intersections due to its specific kinematics including the so-called drilling rotation. As a consequence of asymmetry of strain measures, modified laminates failure criteria must...
-
Quantifying Contextuality
PublikacjaContextuality is central to both the foundations of quantum theory and to the novel information processing tasks. Despite some recent proposals, it still faces a fundamental problem: how to quantify its presence? In this work, we provide a universal framework for quantifying contextuality. We conduct two complementary approaches: (i) the bottom-up approach, where we introduce a communication game, which grasps the phenomenon of...
-
Things You Might Not Know about the k-Nearest Neighbors Algorithm
PublikacjaRecommender Systems aim at suggesting potentially interesting items to a user. The most common kind of Recommender Systems is Collaborative Filtering which follows an intuition that users who liked the same things in the past, are more likely to be interested in the same things in the future. One of Collaborative Filtering methods is the k Nearest Neighbors algorithm which finds k users who are the most similar to an active user...
-
ENISA Study: Challenges in Securing Industrial Control Systems
PublikacjaIn 2011, the European Network and Information Security Agency (ENISA) conducted a study in the domain of Industrial Control Systems (ICS). Its objective was to obtain the current view on the ICS protectionprimarily in Europe but also in the international context. The portrait' included threats, risks, and challenges in the area of ICS protection as well as national, pan European, and international initiatives on ICS security. The...
-
LOW COST MEASUREMENT MODULE FOR MATRIX OF AMPEROMETRIC GAS SENSOR
PublikacjaThis paper describes an amperometric sensor module for gas concentration measurement. A module can be used for many types of electrochemical gas sensors without major hardware changes. Device is based on AVR ATmega8 microcontroller. As signal processing circuit a specialized integrated circuit LMP9l000 configurable via I2C interface is used. The concept of a measuring system composed of several modules dedicated for a gas sensors...
-
Device-independent quantum key distribution based on measurement inputs
PublikacjaWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
A handwritten signature verification method employing a tablet
PublikacjaA signature verification system based on static features and time-domain functions of signals obtained using a tablet has been presented in the paper. The signature verification method, based mainly on dynamic time warping coupled with some signature image features, has been described. The FRR measures reflecting the method's efficiency have been evaluated for verification attempts performed directly after obtaining model signatures...
-
Exploring the technological dimension of Autonomous sensory meridian response-induced physiological responses Cite this as Seifzadeh S, Kostek B. 2024. Exploring the technological dimension of Autonomous sensory meridian response-induced physiological responses. PeerJ 12:e17754 https://doi.org/10.7717/peerj.17754
PublikacjaBackground In recent years, the scientific community has been captivated by the intriguing Autonomous sensory meridian response (ASMR), a unique phenomenon characterized by tingling sensations originating from the scalp and propagating down the spine. While anecdotal evidence suggests the therapeutic potential of ASMR, the field has witnessed a surge of scientific interest, particularly through the use of neuroimaging techniques...
-
INTEGRATED FUNCTIONAL SAFETY AND CYBERSECURITY ANALYSIS METHOD FOR SMART MANUFACTURING SYSTEMS
PublikacjaThis article addresses integrated functional safety and cybersecurity analysis with regard to: the generic functional safety standard IEC 61508 and the cyber security standard IEC 62443 concerning an industrial automation and control system (IACS). The objective is to mitigate the vulnerability of information technology (IT) and operational technology (OT) systems, and reduce relevant risks taking into account a set of fundamental...
-
Trust Management Method for Wireless Sensor Networks
PublikacjaA Wireless Sensor Network (WSN) is a network of spatially distributed autonomous sensors to monitor physical or environmental conditions, such as temperature, sound, pressure, etc. and to cooperatively pass their data to the main location. The first wireless network that bore any real resemblance to a modern WSN is the Sound Surveillance System (SOSUS), developed by the United States Military in the 1950s to detect and track Soviet...
-
Choosing the Right Cybersecurity Solution: A Review of Selection and Evaluation Criteria
PublikacjaInformation technologies evolve continuously reaching pioneering areas that bring in new cybersecurity challenges. Security engineering needs to keep pace with the advancing cyberthreats by providing innovative solutions. At the same time, the foundations that include security and risk assessment methodologies should remain stable. Experts are offered with an extensive portfolio of solutions and an informed choice of a particular...
-
Generalized access control in hierarchical computer network
PublikacjaThe paper presents the design of the security layer for a distributed system located in the multizone hierarchical computer network. Depending on the zone from which a client’s request comes to the system and the type of the request, it will be either authorized or rejected. There is one common layer for the access to all the business services and interactions between them. Unlike the commonly used RBAC model, this system enforces...
-
Seismic Pounding Between Bridge Segments: A State-of-the-Art Review
PublikacjaEarthquake-induced structural pounding in bridge structures has been observed in several previous seismic events. Collisions occur at the expansion joints provided between adjacent decks or between the deck and abutment. Pounding between the structural elements may lead to severe damages and even to the unseating of the bridge in certain cases. Several investigations have been performed to study pounding in bridges under uniform...
-
Validation of a virtual test environment for C2X communication under radio jamming conditions
PublikacjaIn this paper, we propose a novel car-2-x communication security testing methodology in the physical layer of wireless systems. The approach is dedicated to automated testing of autonomous vehicles and it is essential for such complex systems operation, especially with regard to safety and security issues. It is based on scenario-driven testing in virtual and real test environments created from collected or simulated data. The...
-
Control system for contactless electrical energy transfer with varying air gap
PublikacjaInductive power transfer (IPT) is a system by which electrical energy may be transmitted without electrical connection through a large air gap between coils. Systems usually considered in the literature are the ones with a constant air gap. The paper describes the analysis of IPT, which allows for supplying an electrical load in the conditions of slow, in relation to the dynamics of power supply, changes in the dimensions of the...
-
Bounds on isolated scattering number
PublikacjaThe isolated scattering number is a parameter that measures the vulnerability of networks. This measure is bounded by formulas de- pending on the independence number. We present new bounds on the isolated scattering number that can be calculated in polynomial time.
-
Bounds on isolated scattering number
PublikacjaThe isolated scattering number is a parameter that measures the vulnerability of networks. This measure is bounded by formulas de- pending on the independence number. We present new bounds on the isolated scattering number that can be calculated in polynomial time.
-
Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej - analiza i ocena
PublikacjaW niniejszym rozdziale monografii przedstawiono bardzo aktualną problematykę związaną z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej w obiektach infrastruktury krytycznej, wykorzystujących przemysłową sieć komputerową, z uwzględnieniem zagadnień ochrony informacji. W obiektach tego typu systemy sterowania i automatyki zabezpieczeniowej są projektowane jako systemy rozproszone,...
-
Speed management on local government managed roads – research, recommendations and guidelines
PublikacjaCommissioned by the National Road Safety Council Secretariat, the project “Guidelines for speed management on local government managed roads” studied car driver be haviour when subjected to selected speed management measures such a local speed restrictions, surveillance, traffic calming and restricted speed areas. In addition, analyses were conducted on the impact of selected me asures...
-
Weryfikacja Poziomów Nienaruszalności Bezpieczeństwa z uwzględnieniem Zagadnień Ochrony Informacji
PublikacjaNiniejszy rozdział poświęcono wybranym istotnym zagadnieniom analizy bezpieczeństwa funkcjonalnego, w szczególności weryfikacji poziomów nienaruszalności bezpieczeństwa SIL funkcji bezpieczeństwa implementowanych w rozproszonych systemach sterowania i zabezpieczeń z uwzględnieniem zagadnień ochrony informacji. Zaproponowano metodę opartą na informacji ilościowej i jakościowej do weryfikacji SIL (IEC 61508, 61511) z uwzględnieniem...
-
Fianl report on carrying out tasks within the project Best Agers Lighthouses - strategic age management for SME in the Baltic Sea Region.
PublikacjaThe report presents the origin of the project, as well as its characteristics and aims. Project partners are workpackages are described and main project results are listed. the report is concluded with the part dedicated to dissemination measures carried out within the project
-
THE INVESTMENT ENVIRONMENT MANAGEMENT SYSTEM IN THE FRAMEWORK OF LEGAL SUPPORT AS A FACTOR OF NATIONAL SAFETY
Publikacja -
Activity-based payments: alternative (anonymous) online payment model
PublikacjaElectronic payments are the cornerstone of web-based commerce. A steady decrease in cash usage has been observed, while various digital payment technologies are taking over. They process sensitive personal information raising concerns about its potentially illicit usage. Several payment models that confront this challenge have been proposed. They offer varying levels of anonymity and readiness for adoption. The aim of this study...
-
COMPARATIVE ANALYSES OF INTERNATIONALIZATION OF KAZAKHSTAN ENTERPRISES
PublikacjaThis paper presents the instruments of internationalization of enterprises operating within the Eurasian Economic Union. Research contains answers of 108 enterprises exporters located in the Republic of Kazakhstan. The purpose of the paper is to show the main forms of the internationalization of enterprises in Kazakhstan. The paper also presents the following instruments of enterprises’ internationalization including: indirect...
-
Modified dynamic time warping method applied to handwritten signature authenticity verification
PublikacjaA signature verification system based on static features and time-domain functions of signals obtained using a tablet has been presented in the paper. The signature verification method, based mainly on dynamic time warping coupled with some signature image features, has been described. The FRR measures reflecting the method’s efficiency have been evaluated for verification attempts performed directly after obtaining model signatures...
-
Valorization of waste cabbage leaves by postharvest photochemical treatments monitored with a non-destructive fluorescence-based sensor
PublikacjaThe biosynthesis of polyphenolic compounds in cabbage waste, outer green leaves of white head cabbage (Brassica oleracea L. var. capitata subvar. alba), was stimulated by postharvest irradiation with UVB lamps or sunlight. Both treatments boosted the content of kaempferol and quercetin glycosides, especially in the basal leaf zone, as determined by the HPLC analysis of leaf extracts and by a non-destructive optical sensor. The...
-
Wetlands in flux: looking for the drivers in a central European case
PublikacjaPlanet Earth is undergoing significant changes which are driven by natural and anthropogenic factors. However, it is difficult to identify the drivers and their effect on the environment and ecosystems because there are many interdependencies. In this study we present a multi-parameter approach to assess the effect of changes in human-induced and natural drivers on a wetland ecosystem. The study area is one of the most prominent...
-
Enhancing the bioconversion rate and end products of black soldier fly (BSF) treatment – A comprehensive review
PublikacjaFood security remains a pressing concern in the face of an increasing world population and environmental challenges. As climate change, biodiversity loss, and water scarcity continue to impact agricultural productivity, traditional livestock farming faces limitations in meeting the growing global demand for meat and dairy products. In this context, black soldier fly larvae (BSFL) have emerged as a promising alternative for sustainable...
-
Quantitative Storytelling in the Making of a Composite Indicator
PublikacjaThe reasons for and against composite indicators are briefly reviewed, as well as the available theories for their construction. After noting the strong normative dimension of these measures—which ultimately aim to ‘tell a story’, e.g. to promote the social discovery of a particular phenomenon, we inquire whether a less partisan use of a composite indicator can be proposed by allowing more latitude in the framing of its construction....
-
The Evaluation of Use of Colors in Graphical User-Interfaces in Healthcare
PublikacjaIn this paper, color difference/contrast measures are investigated in reference to results of experiments with the participation of average, color-normal observers and with individuals with deuteranopia. Additionally, a new method for the automatic analysis of color contrast is proposed, which supports designers of graphical user- interfaces in healthcare. The method was verified using the GUI phantom of a vital signs monitor (the...
-
On IPSec Performance Testing of IPv4/IPv6 IPSec Gateway
PublikacjaZapewnienie, że brama IPSec (ang. Internet Protocol Security) spełnia oczekiwania wydajnościowe jest jednym z najważniejszych wyzwań, przed jakimi stoi zespół projektowy tworzący ten produkt. Jedynie odpowiednie podejście do walidacji może zagwarantować, że przepustowość ruchu IPSec bramy jest na oczekiwanym poziomie, czas dodawania/usuwania konfiguracji SA (ang. Security Associations) jest akceptowalny, brama IPSec jest w stanie...
-
Threat intelligence platform for the energy sector
PublikacjaIn recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...
-
Design and Application of Magnetic Photocatalysts for Water Treatment. The Effect of Particle Charge on Surface
PublikacjaCore-interlayer-shell Fe3O4/SiO2/TiO2, CoFe2O4/SiO2/TiO2 and BaFe12O19/SiO2/TiO2 magnetic photocatalysts were obtained. A water-in-oil microemulsion system with suitable surfactants was used for functionalization of the magnetic core with silica interlayer and TiO2-based photocatalyst. Uncoated and coated particles were characterized by electrophoretic meaurements, X-ray diffractometry (XRD), scanning electron microscopy (SEM),...
-
Modelowanie podziału zadań przewozowych w obszarach zurbanizowanych
PublikacjaNiniejsza rozprawa doktorska dotyczy problematyki modelowania podziału zadań przewozowych w procesie modelowania podróży. Wykonane analizy wykazały zasadność zastosowania dodatkowych czynników w modelowaniu wyboru środka transportu z uwagi na ich istotny wpływ na jakość modelu dla wybranych motywacji podróży. W pracy zawarto przykładowe modele uwzględniające każdy z analizowanych czynników. Z wykorzystaniem badań heurystycznych...
-
Bezpieczeństwo elektroenergetyczne dla pokoleń
PublikacjaW artykule przeanalizowano źródła energii pierwotnej, ich wystarczalnośći dywersyfikację w skali lokalnej i globalnej, problem dekarbonizacji polskiej elektroenergetyki na tle europejskiej polityki klimatycznej, osiągalność źródeł gazu jako efektywnego paliwa dla energetyki, polski program energetyki jądrowej, bezpieczeństwo zasilania elektrycznych systemów trakcyjnych jako strategicznej alternatywy...
-
Aestheticization of Flowcharts
PublikacjaOne of the important issues of diagrams is their aesthetics. In this paper a method of its formalization for freehand drawn flowcharts is proposed. In order to formalize the evaluation of flowcharts' aesthetics a criterion consisting of several measures is proposed. Based on this criterion the algorithms for automatic optimization of flowcharts' appearance are proposed.
-
Planning of the green road system as an element of spatial management in suburbs and small towns
PublikacjaThe premise for the development of sustainable forms of road infrastructure in small towns is the appropriate plan at an early stage or modifi cation in the case of existing spaces. A multi-directional approach is extremely important, which takes into account the specifi city of the regional (country) road system, availability, and capacity of traffi c network, but also social and environmental factors. Effi cient management...
-
Platforma KASKADA jako system zapewniania bezpieczeństwa poprzez masową analizę strumieni multimedialnych w czasie rzeczywistym
PublikacjaW artykule przedstawiono Platformę KASKADA rozumianą jako system przetwarzania danych cyfrowych i strumieni multimedialnych oraz stanowiącą ofertę usług wspomagających zapewnienie bezpieczeństwa publicznego, ocenę badań medycznych i ochronę własności intelektualnej. celem prowadzonych prac było stworzenie innowacyjnego systemu umozliwiajacego wydajną i masową analizę dokumentów cyfrowych i strumieni multimedialnych w czasie rzeczywistym...
-
A place of school in the idea of the sustainable development
PublikacjaWell designed school space enables social contacts, increases activity of pupils and improves the condition of their health. However, the best design would not bring the expected benefits if it is not integrated with the surroundings in terms of transportation, security and local needs. In the sustainable development, the social goals are in harmony with ecological aims according to the rule of "3 r" (reduce, reuse, recycle).
-
Self-Organizing Wireless Monitoring System for Containers
PublikacjaThis paper presents a description of new global monitoring system for containers, with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing Container Monitoring Network...
-
Self-organizing wireless monitoring system for cargo containers
PublikacjaThis paper presents a description of new global monitoring system for containers with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing ContainerMonitoring Network is...