Filtry
wszystkich: 460
wybranych: 420
-
Katalog
Filtry wybranego katalogu
Wyniki wyszukiwania dla: SYSTEM SECURITY
-
The KLC Cultures, Tacit Knowledge, and Trust Contribution to Organizational Intelligence Activation
PublikacjaIn this paper, the authors address a new approach to three organizational, functional cultures: knowledge culture, learning culture, and collaboration culture, named together the KLC cultures. Authors claim that the KLC approach in knowledge-driven organizations must be designed and nourished to leverage knowledge and intellectual capital. It is suggested that they are necessary for simultaneous implementation because no one of...
-
On symmetric extendibility of quantum states and its applications
PublikacjaThis dissertation is focused on analysis of the symmetric extendibility of quantum states and its applications in the quantum information theory, with special attention paid to the area of quantum entanglement distillation, quantum channels theory, quantum security, and monogamy of quantum entanglement in time. We analyze geometry of the set of symmetric extendible states, i.e. such states that possess symmetric extensions and...
-
Robot-Based Intervention for Children With Autism Spectrum Disorder: A Systematic Literature Review
PublikacjaChildren with autism spectrum disorder (ASD) have deficits in the socio-communicative domain and frequently face severe difficulties in the recognition and expression of emotions. Existing literature suggested that children with ASD benefit from robot-based interventions. However, studies varied considerably in participant characteristics, applied robots, and trained skills. Here, we reviewed robot-based interventions targeting...
-
Performance Analysis of Machine Learning Methods with Class Imbalance Problem in Android Malware Detection
PublikacjaDue to the exponential rise of mobile technology, a slew of new mobile security concerns has surfaced recently. To address the hazards connected with malware, many approaches have been developed. Signature-based detection is the most widely used approach for detecting Android malware. This approach has the disadvantage of being unable to identify unknown malware. As a result of this issue, machine learning (ML) for detecting malware...
-
Improved RSS-Based DoA Estimation Accuracy in Low-Profile ESPAR Antenna Using SVM Approach
PublikacjaIn this paper, we have shown how the overall performance of direction-of-arrival (DoA) estimation using lowprofile electronically steerable parasitic array radiator (ESPAR) antenna, which has been proposed for Internet of Things (IoT) applications, can significantly be improved when support vector machine (SVM) approach is applied. Because the SVM-based DoA estimation method used herein relies solely...
-
Automatic recognition of males and females among web browser users based on behavioural patterns of peripherals usage
PublikacjaPurpose The purpose of this paper is to answer the question whether it is possible to recognise the gender of a web browser user on the basis of keystroke dynamics and mouse movements. Design/methodology/approach An experiment was organised in order to track mouse and keyboard usage using a special web browser plug-in. After collecting the data, a number of parameters describing the users’ keystrokes, mouse movements and clicks...
-
Edible dragonflies and damselflies (order Odonata) as human food – A comprehensive review
PublikacjaThe rapid growth of the human population leads to a big concern about the food y and demand worldwide. However, due to the reduction in global arable land area, humans need to find alternative food sources to fulfil their needs. Consequently, edible insects have been identified as a promising solution to ameliorate food security and increase global nutrition. Among more than 2,100 identified edible insect species, dragonflies and...
-
A Simple Neural Network for Collision Detection of Collaborative Robots
PublikacjaDue to the epidemic threat, more and more companies decide to automate their production lines. Given the lack of adequate security or space, in most cases, such companies cannot use classic production robots. The solution to this problem is the use of collaborative robots (cobots). However, the required equipment (force sensors) or alternative methods of detecting a threat to humans are usually quite expensive. The article presents...
-
Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection
PublikacjaAs a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used method for identifying Android malware is signature-based detection. The drawback of this method, however, is that it is unable to detect unknown malware. As a consequence of this problem,...
-
RSS-Based DoA Estimation Using ESPAR Antenna for V2X Applications in 802.11p Frequency Band
PublikacjaIn this paper, we have proposed direction-of arrival (DoA) estimation of incoming signals for V2X applications in 802. 11p frequency band, based on recording of received signal strength (RSS) at electronically steerable parasitic array radiator (ESPAR) antenna's output port. The motivation of the work was to prove that ESPAR antenna used to increase connectivity and security in V2X communication can...
-
Art and Healthcare - Healing Potential of Artistic Interventions in Medical Settings
PublikacjaThe stereotype of a machine for healing seems to be well rooted in common thinking and social perception of hospital buildings. The technological aspect of healthcare architecture has been influenced for several years by three major factors. The first is linked to the necessity of providing safety and security in the environment of elevated epidemiological risk. The second concerns the need for incorporating advanced technology...
-
Sensors for Rapid Detection of Environmental Toxicity in Blood of Poisoned People
PublikacjaRecently, the diagnosis and treatment of poisoned person can be done only in specialized centers. Furthermore, currently used clinical methods of intoxication diagnosis are not sufficient for early detection. Conventional laboratory tests based on urine and blood require professional, high skilled staff, high cost equipment as well as they are arduous and lasting analytical procedures. There is a need to elaborate relatively cheap...
-
Technological solutions to landfill management: Towards recovery of biomethane and carbon neutrality
PublikacjaInadequate landfill management poses risks to the environment and human health, necessitating action. Poorly designed and operated landfills release harmful gases, contaminate water, and deplete resources. Aligning landfill management with the Sustainable Development Goals (SDGs) reveals its crucial role in achieving various targets. Urgent transformation of landfill practices is necessary to address challenges like climate change,...
-
Functional safety and managing competence
PublikacjaSą nowe wyzwania związane z badaniami, edukacją i szkoleniem w obszarach bezpieczeństwa i ochrony systemów i sieci krytycznych. W rozdziale podkreśla się, że kompetencje specjalistów powinny być kształtowane w zintegrowanych procesach edukacji i szkolenia. Dlatego uzasadnione jest, aby opracować w Europie standardy i programy kształcenia na bazie odpowiednich prac badawczych i najlepszych doświadczeń z praktyki przemysłowej w celu...
-
Autonomous port management based AGV path planning and optimization via an ensemble reinforcement learning framework
PublikacjaThe rapid development of shipping trade pushes automated container terminals toward the direction of intelligence, safety and efficiency. In particular, the formulation of AGV scheduling tasks and the safety and stability of transportation path is an important part of port operation and management, and it is one of the basic tasks to build an intelligent port. Existing research mainly focuses on collaborative operation between...
-
The Russian Federation in European Union Programmes
PublikacjaSince the early 1990s, the European Union has been supporting socio-economic transformations in the former Soviet Union states, including the Russian Federation. Initially, this assistance was provided in the framework of the TACIS Programme, offering long-term, non-repayable aid. In 1991–2006 Russia received EUR 2.7bn for the restructuring of the state enterprise sector, establishment of private companies, state administration...
-
Wpływ barier ochronnych na poziom bezpieczeństwa ruchu drogowego
PublikacjaWypadki drogowe wciąż stanowią znaczną przyczynę zgonów, dlatego bardzo ważnym jest odpowiednie kształtowanie otoczenia drogi – by mogło ono uzyskać miano „wybaczającego”. Artykuł stanowi wprowadzenie do tematyki drogowych barier ochronnych, i jest częścią pracy dyplomowej realizowanej na Politechnice Gdańskiej, w ramach której autorzy analizują zależności pomiędzy wypadkami a omawianymi urządzeniami BRD. W artykule przedstawiono...
-
Impact of laser beam welding on mechanical behaviour of 2.25Cr–1Mo (P22) steel
PublikacjaThe use of welding processes in the manufacturing and repair of structures intended for the energy industry plays a key role in the guarantee of a continuous supply of fossil fuels, which is the basic condition for ensuring energy security. A square butt joint of 10 mm thick plate of 2.25Cr–1Mo (P22) steel was fabricated by autogenous laser beam welding process and then post-weld heat treatment (PWHT) for two sets of process parameters...
-
Energy policy and the role of bioenergy in Poland
PublikacjaPrzedstawiono sytuacje energetyczną kraju. Omówiono poszczególne sektory wytwarzania energii oraz zapotrzebowania na energię i paliwa. Omówiono przekształcenia sektorów energetycznych w Polsce na przestrzeni lat 1990-2002. Na tym tle przedstawiono techniczne, ekonomiczne, społeczne i prawne aspekty rozwoju energetyki źródeł odnawialnych a w szczególności opartych o bioenergię. Przedstawiono wnioski dla Polski płynące z dotychczasowych...
-
Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej
PublikacjaW monografii przedstawiono aktualną problematykę związaną z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej w obiektach i systemach infrastruktury krytycznej, wykorzystujących przemysłową sieć komputerową, z uwzględnieniem zagadnień ochrony informacji. W obiektach tego typu systemy sterowania i automatyki zabezpieczeniowej są projektowane jako systemy rozproszone, których nieprawidłowe...