Wyniki wyszukiwania dla: security systems - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: security systems

Filtry

wszystkich: 578
wybranych: 432

wyczyść wszystkie filtry


Filtry wybranego katalogu

  • Kategoria

  • Rok

  • Opcje

wyczyść Filtry wybranego katalogu niedostępne

Wyniki wyszukiwania dla: security systems

  • Tracking of the broadband source of the underwater noise in the very shallow water conditions

    Publikacja

    The paper contains the result s, both theoretical and experimental , connected with the tracking of the underwater noise source as small ships, pontoon , diver and so on. The pro blem of security in the shallow water area is the challenge for underwater acousticians. In this paper there is take n into account the detection of the sources that move on the surface of the sea or underwater in shallow...

    Pełny tekst do pobrania w portalu

  • Comparison of AHP and Numerical Taxonomy Methods Based on Biogas Plant Location Analysis

    Publikacja

    The paper presents a comparison of the multi-criteria Analytic Hierarchy Process (AHP) method and numerical taxonomy in biogas plant location selection. Biogas plants are sources that will significantly contribute to the implementation of the provisions of the energy and climate package for Poland by 2030. Increasing the share of energy produced from renewable sources, e.g. biogas plants, will increase the country’s energy security....

    Pełny tekst do pobrania w portalu

  • Student Perspectives on the 2017 ESA Concurrent Engineering Challenge

    Publikacja
    • K. Doerksen
    • T. van‘t Klooster
    • W. Ferguson
    • S. Pepper
    • D. van Paridon
    • R. Amorim
    • R. Chotalal
    • K. Ciechowska
    • A. Dąbrowski
    • V. Kunbrger... i 4 innych

    - Rok 2018

    In September 2017, the first ESA Academy’s Concurrent Engineering Challenge (CEC) was held, giving 88 Master’s and PhD-level students from twelve ESA Member and Associate States a powerful platform to experience system engineering in an intense, fast paced, and real-world environment. Within four days, teams of physics and engineering students in Concurrent Design Facilities (CDF) located in Politecnico di Torino, Universidad Polit´ecnica...

    Pełny tekst do pobrania w portalu

  • Overview of Metamaterials-Integrated Antennas for Beam Manipulation Applications: The Two Decades of Progress

    Publikacja

    - IEEE Access - Rok 2022

    Metamaterials (MMs) are synthetic composite structures with superior properties not found in naturally occurring materials. MMs have gained massive attention over the last two decades because of their extraordinary properties, such as negative permittivity and permeability. These materials enable many applications in communication subsystems, especially in the field of antenna design, to enhance gain, bandwidth, and efficiency,...

    Pełny tekst do pobrania w portalu

  • Urban city lights. Light pollution as one of the effects of incorrectly designed external illumination. How can a successful lighting masterplan diminish its impact?

    Publikacja
    • K. M. Zielińska-Dąbkowska

    - Rok 2014

    In the modern world, artificial lighting brings many tangible benefits such as the ability to extend working hours and so increase production, recreational use of the city after dark, or the possibility to travel regardless of the time of day. However, this flexibility comes at a price and negatively impacts on the environment. One such negative phenomenon is Light Pollution ‐ a term used to describe excessive nighttime artificial...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Extraction of stable foreground image regions for unattended luggage detection

    A novel approach to detection of stationary objects in the video stream is presented. Stationary objects are these separated from the static background, but remaining motionless for a prolonged time. Extraction of stationary objects from images is useful in automatic detection of unattended luggage. The proposed algorithm is based on detection of image regions containing foreground image pixels having stable values in time and...

    Pełny tekst do pobrania w portalu

  • Wyzwania metodyczne w procesie zarządzania bezpieczeństwem elektrowni jądrowych

    Publikacja

    - Rok 2012

    W pracy przedstawiono aktualne zagadnienia i wyzwania metodyczne dotyczące zarządzania bezpieczeństwem elektrowni jądrowych. Nawiązuje się m.in. do publikacji Międzynarodowej Agencji Energii Atomowej z siedzibą w Wiedniu w sprawie zintegrowanego podejścia do zarządzaniu bezpieczeństwem (safety) i ochroną (security). Podkreśla się znaczenie projektowania niezależnych barier w systemie zabezpieczeń i zwiększania roli pasywnych układów...

  • Analysis of electricity generation variability in 2019 with special consideration of electrical energy generation from wind sources.

    Publikacja

    - Rok 2020

    This article presents issues related to the broadly understood development of wind energy. The state of the art of wind energy in the world has been discussed. This paper also shows issues related to factors affecting the development of renewable energy sources and their impact on the natural environment on the basis of available research. The focus is, however, on the critical analysis of phenomena in the data of the Transmission...

    Pełny tekst do pobrania w portalu

  • Narracje o świeżej traumie. Upamiętnianie ataków terrorystycznych w krajobrazie codziennym miast

    Recent trauma Narratives: commemorating terrorist attacks in Everyday cityscape Contemporary city incidentally becomes a non-accidental target of acts violating the primary sense of security and safety. The fundamental assumptions about so- cial and interpersonal interactions that guarantee social life are severely disturbed. These events, primarily the ones related to terrorist attacks, leave in social memo- ry traces associated...

    Pełny tekst do pobrania w portalu

  • Hybrid no-signaling-quantum correlations

    Publikacja

    - NEW JOURNAL OF PHYSICS - Rok 2022

    Fundamental investigations in non-locality have shown that while the no-signaling principle alone is not sufficient to single out the set of quantum non-local correlations, local quantum mechanics and no-signaling together exactly reproduce the set of quantum correlations in the two-party Bell scenario. Here, we introduce and study an intermediate hybrid no-signaling quantum set of non-local correlations that we term HNSQ in the...

    Pełny tekst do pobrania w portalu

  • Possibilities for Developing Electromobility by Using Autonomously Powered Trolleybuses Based on the Example of Gdynia

    Publikacja

    - ENERGIES - Rok 2021

    Trolleybus transport refers to contemporary challenges related to a reduction in emissions of greenhouse gases and CO2 into the atmosphere formulated by international institutions, such as the United Nations, the Organisation for Security and Co-operation in Europe, or the European Union. Departure from fossil fuels in urban transport is one of the key challenges for the coming years. Trolleybuses are an important tool in this...

    Pełny tekst do pobrania w portalu

  • The KLC Cultures, Tacit Knowledge, and Trust Contribution to Organizational Intelligence Activation

    Publikacja

    - Rok 2023

    In this paper, the authors address a new approach to three organizational, functional cultures: knowledge culture, learning culture, and collaboration culture, named together the KLC cultures. Authors claim that the KLC approach in knowledge-driven organizations must be designed and nourished to leverage knowledge and intellectual capital. It is suggested that they are necessary for simultaneous implementation because no one of...

    Pełny tekst do pobrania w portalu

  • Zastosowanie szablonów Trust Case w pracy z normą BS 7799

    Publikacja

    - Rok 2006

    Trust Case stanowi strukturę danych zawierającą argumentację oraz związany z nią materiał dowodowy uzasadniający, że interesujący nas obiekt (system, infrastruktura, organizacja) posiada wskazane własności. Wykorzystanie Trust Case do analizy i uzasadniania zaufania do systemów IT jest przedmiotem aktywnych badań. Podejście to znalazło zastosowanie w stosunku do systemów związanych z bezpieczeństwem (ang. safety critical), a ostatnio...

  • On symmetric extendibility of quantum states and its applications

    Publikacja

    - Rok 2017

    This dissertation is focused on analysis of the symmetric extendibility of quantum states and its applications in the quantum information theory, with special attention paid to the area of quantum entanglement distillation, quantum channels theory, quantum security, and monogamy of quantum entanglement in time. We analyze geometry of the set of symmetric extendible states, i.e. such states that possess symmetric extensions and...

    Pełny tekst do pobrania w portalu

  • Greencoin: a Pro­environmental Action-­Reward System

    Publikacja

    The massive destruction of the natural environment is rapidly eroding the world’s capacity to provide food and water, threatening the security of billions of people. In order to facilitate green lifestyles – understood in terms of both pro-environmental behaviors and green self-image on the one hand, and to build sustainable local and global communities, on the other, we put forward an idea of a novel action-reward system based...

    Pełny tekst do pobrania w portalu

  • Performance Analysis of Machine Learning Methods with Class Imbalance Problem in Android Malware Detection

    Publikacja
    • A. G. Akintola
    • A. O. Balogun
    • H. A. Mojeed
    • F. Usman-Hamza
    • S. A. Salihu
    • K. S. Adewole
    • G. B. Balogun
    • P. O. Sadiku

    - International Journal of Interactive Mobile Technologies - Rok 2022

    Due to the exponential rise of mobile technology, a slew of new mobile security concerns has surfaced recently. To address the hazards connected with malware, many approaches have been developed. Signature-based detection is the most widely used approach for detecting Android malware. This approach has the disadvantage of being unable to identify unknown malware. As a result of this issue, machine learning (ML) for detecting malware...

    Pełny tekst do pobrania w portalu

  • Amplifying the Randomness of Weak Sources Correlated With Devices

    Publikacja

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Rok 2017

    The problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Randomness Amplification under Minimal Fundamental Assumptions on the Devices

    Publikacja
    • R. Ramanathan
    • F. Brandão
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • H. Wojewódka

    - PHYSICAL REVIEW LETTERS - Rok 2016

    Recently, the physically realistic protocol amplifying the randomness of Santha-Vazirani sources producing cryptographically secure random bits was proposed; however, for reasons of practical relevance, the crucial question remained open regarding whether this can be accomplished under the minimal conditions necessary for the task. Namely, is it possible to achieve randomness amplification using only two no-signaling components...

    Pełny tekst do pobrania w portalu

  • Protection System Design of Induction Motor for Industries

    Publikacja

    - Rok 2022

    The fundamental and durable structures of induction motor, as well as their low manufacturing cost, make them popular components in a wide range of current applications. Providing a safety net for employees is a must-have for businesses. This project’s motivation for improvement is to provide industrial motors, lift motors, pumps, and so on with safety. An induction motor’s primary goal is to protect it from problems, such as...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Protection System Design of Induction Motor for Industries

    Publikacja

    - Modelling and Simulation in Engineering - Rok 2022

    The fundamental and durable structures of induction motor, as well as their low manufacturing cost, make them popular components in a wide range of current applications. Providing a safety net for employees is a must-have for businesses. This project’s motivation for improvement is to provide industrial motors, lift motors, pumps, and so on with safety. An induction motor’s primary goal is to protect it from problems, such as...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Edible dragonflies and damselflies (order Odonata) as human food – A comprehensive review

    Publikacja
    • S. A. Siddiqui
    • K. Asante
    • N. Ngah
    • Y. Saraswati
    • Y. Wu
    • M. Lahan
    • O. Aidoo
    • I. Fernando
    • S. Povetkin
    • R. Castro Munoz

    - Journal of Insects as Food and Feed - Rok 2024

    The rapid growth of the human population leads to a big concern about the food y and demand worldwide. However, due to the reduction in global arable land area, humans need to find alternative food sources to fulfil their needs. Consequently, edible insects have been identified as a promising solution to ameliorate food security and increase global nutrition. Among more than 2,100 identified edible insect species, dragonflies and...

    Pełny tekst do pobrania w portalu

  • Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection

    Publikacja
    • A. G. Akintola
    • A. O. Balogun
    • L. F. Capretz
    • H. A. Mojeed
    • S. Basri
    • S. A. Salihu
    • F. E. Usman-Hamza
    • P. O. Sadiku
    • G. B. Balogun
    • Z. O. Alanamu

    - Applied Sciences-Basel - Rok 2022

    As a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used method for identifying Android malware is signature-based detection. The drawback of this method, however, is that it is unable to detect unknown malware. As a consequence of this problem,...

    Pełny tekst do pobrania w portalu

  • Automatic recognition of males and females among web browser users based on behavioural patterns of peripherals usage

    Publikacja

    - Internet Research - Rok 2016

    Purpose The purpose of this paper is to answer the question whether it is possible to recognise the gender of a web browser user on the basis of keystroke dynamics and mouse movements. Design/methodology/approach An experiment was organised in order to track mouse and keyboard usage using a special web browser plug-in. After collecting the data, a number of parameters describing the users’ keystrokes, mouse movements and clicks...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Technological solutions to landfill management: Towards recovery of biomethane and carbon neutrality

    Publikacja

    - JOURNAL OF ENVIRONMENTAL MANAGEMENT - Rok 2024

    Inadequate landfill management poses risks to the environment and human health, necessitating action. Poorly designed and operated landfills release harmful gases, contaminate water, and deplete resources. Aligning landfill management with the Sustainable Development Goals (SDGs) reveals its crucial role in achieving various targets. Urgent transformation of landfill practices is necessary to address challenges like climate change,...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Art and Healthcare - Healing Potential of Artistic Interventions in Medical Settings

    Publikacja

    The stereotype of a machine for healing seems to be well rooted in common thinking and social perception of hospital buildings. The technological aspect of healthcare architecture has been influenced for several years by three major factors. The first is linked to the necessity of providing safety and security in the environment of elevated epidemiological risk. The second concerns the need for incorporating advanced technology...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Information-driven network resilience: Research challenges and perspectives

    Publikacja
    • J. Rak
    • D. Papadimitriou
    • H. Niedermayer
    • P. Romero

    - Optical Switching and Networking - Rok 2017

    Internet designed over 40 years ago was originally focused on host-to-host message delivery in a best-effort manner. However, introduction of new applications over the years have brought about new requirements related with throughput, scalability, mobility, security, connectivity, and availability among others. Additionally, convergence of telecommunications, media, and information technology was responsible for transformation...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Renewable Energy in the Pomerania Voivodeship—Institutional, Economic, Environmental and Physical Aspects in Light of EU Energy Transformation

    Publikacja

    - ENERGIES - Rok 2021

    In the era of globalization and rapid economic growth, affecting most world economies, increased production and consumption are leading to higher levels of energy production and consumption. The growing demand for energy means that energy resources from conventional sources are not sufficient; moreover, its production generates high costs and contributes to the emission of greenhouse gases and waste. In view of the above, many...

    Pełny tekst do pobrania w portalu

  • Autonomous port management based AGV path planning and optimization via an ensemble reinforcement learning framework

    Publikacja

    - OCEAN & COASTAL MANAGEMENT - Rok 2024

    The rapid development of shipping trade pushes automated container terminals toward the direction of intelligence, safety and efficiency. In particular, the formulation of AGV scheduling tasks and the safety and stability of transportation path is an important part of port operation and management, and it is one of the basic tasks to build an intelligent port. Existing research mainly focuses on collaborative operation between...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The Russian Federation in European Union Programmes

    Since the early 1990s, the European Union has been supporting socio-economic transformations in the former Soviet Union states, including the Russian Federation. Initially, this assistance was provided in the framework of the TACIS Programme, offering long-term, non-repayable aid. In 1991–2006 Russia received EUR 2.7bn for the restructuring of the state enterprise sector, establishment of private companies, state administration...

    Pełny tekst do pobrania w portalu

  • Impact of laser beam welding on mechanical behaviour of 2.25Cr–1Mo (P22) steel

    Publikacja
    • S. Sirohi
    • S. M. Pandey
    • V. Tiwari
    • D. Bhatt
    • D. Fydrych
    • C. Pandey

    - INTERNATIONAL JOURNAL OF PRESSURE VESSELS AND PIPING - Rok 2023

    The use of welding processes in the manufacturing and repair of structures intended for the energy industry plays a key role in the guarantee of a continuous supply of fossil fuels, which is the basic condition for ensuring energy security. A square butt joint of 10 mm thick plate of 2.25Cr–1Mo (P22) steel was fabricated by autogenous laser beam welding process and then post-weld heat treatment (PWHT) for two sets of process parameters...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Energy policy and the role of bioenergy in Poland

    Publikacja

    - ENERGY POLICY - Rok 2006

    Przedstawiono sytuacje energetyczną kraju. Omówiono poszczególne sektory wytwarzania energii oraz zapotrzebowania na energię i paliwa. Omówiono przekształcenia sektorów energetycznych w Polsce na przestrzeni lat 1990-2002. Na tym tle przedstawiono techniczne, ekonomiczne, społeczne i prawne aspekty rozwoju energetyki źródeł odnawialnych a w szczególności opartych o bioenergię. Przedstawiono wnioski dla Polski płynące z dotychczasowych...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej

    Publikacja

    - Rok 2018

    W monografii przedstawiono aktualną problematykę związaną z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej w obiektach i systemach infrastruktury krytycznej, wykorzystujących przemysłową sieć komputerową, z uwzględnieniem zagadnień ochrony informacji. W obiektach tego typu systemy sterowania i automatyki zabezpieczeniowej są projektowane jako systemy rozproszone, których nieprawidłowe...

    Pełny tekst do pobrania w serwisie zewnętrznym