Filtry
wszystkich: 26225
wybranych: 3928
-
Katalog
- Publikacje 3928 wyników po odfiltrowaniu
- Czasopisma 585 wyników po odfiltrowaniu
- Konferencje 261 wyników po odfiltrowaniu
- Wydawnictwa 2 wyników po odfiltrowaniu
- Osoby 510 wyników po odfiltrowaniu
- Wynalazki 1 wyników po odfiltrowaniu
- Projekty 23 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Kursy Online 125 wyników po odfiltrowaniu
- Wydarzenia 3 wyników po odfiltrowaniu
- Dane Badawcze 20786 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: INFORMATION%20SECURITY
-
Functional Safety and Cybersecurity Analysis and Management in Smart Manufacturing Systems
PublikacjaThis chapter addresses some of the issues of the integrated functional safety and cybersecurity analysis and management with regard to selected references and the functional safety standards: IEC 61508, IEC 61511, ISO 13849-1 and IEC 62061, and a cybersecurity standard IEC 62443 that concerns the industrial automation and control systems. The objective is to mitigate the vulnerability of industrial systems that include the information...
-
Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents
PublikacjaElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...
-
Analytical studies of spectrum broadcast structures in quantum Brownian motion
PublikacjaSpectrum broadcast structures are a new and fresh concept in the quantum-to-classical transition, introduced recently in the context of decoherence and the appearance of objective features in quantum mechanics. These are specific quantum state structures, responsible for the objectivization of the decohered state of a system. Recently, they have been demonstrated by means of the well-known quantum Brownian motion model of the recoilless...
-
Logistics of Transnational Corporations as the Basis of Cooperation Between Ukraine and EU (for Poland Example)
PublikacjaThe article describes the scientific and theoretical basis for the organization of logistics management of modern international corporations, owning by assets in mining and metallurgical business in Ukraine and Poland; it had been analyzed the influence of transfer pricing mechanism as one of the main factors affecting on the efficiency of the organization of supply chain of resources (Ukrainian semi-finished goods) to ensure uninterrupted...
-
Intraday price reaction to filing bankruptcy and restructuring proceedings – the evidence from Poland
PublikacjaThis chapter presents the results of research on the price reaction of shares listed on the Warsaw Stock Exchange to filing bankruptcy and/or restructuring applications. Event study was adopted as the research method, and it was performed at 10, 5, and 1-minute intervals. It was found that the reaction is rapid, as it takes 1–2 minutes after the information on bankruptcy and restructuring applications was made public. Significantly...
-
Edible dragonflies and damselflies (order Odonata) as human food – A comprehensive review
PublikacjaThe rapid growth of the human population leads to a big concern about the food y and demand worldwide. However, due to the reduction in global arable land area, humans need to find alternative food sources to fulfil their needs. Consequently, edible insects have been identified as a promising solution to ameliorate food security and increase global nutrition. Among more than 2,100 identified edible insect species, dragonflies and...
-
The application of non-destructive methods in the diagnostics of the approach pavement at the bridges
PublikacjaThe article presents the possibility of using non-destructive methods of road pavement diagnostics as an alternative to traditional means to assess the reasons for premature cracks adjacent to bridge objects. Two scanning methods were used: laser scanning to measure geometric surface deformation and ground penetrating radar (GPR) inspection to assess the road pavement condition. With the use of a laser scanner, an effective tool...
-
The methods of secure data transmission in the KNX system
PublikacjaThe article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.
-
Effects of Xanthan Gum Biopolymer on the Permeability, Odometer, Unconfined Compressive and Triaxial Shear Behavior of a Sand
PublikacjaBiopolymers, which are microbially induced polymers, can be used as an alternative material to improve engineering performance of soils. In this paper, a laboratory study of 0.075-1.0 mm size sand and biopolymer (i.e., xanthan gum) mixtures with various mix ratios (0%, 0.5%, 1.0%, and 1.5%) was performed. The materials, specimen preparation, and test methods are described, as are the results of a suite of permeability, odometer, unconfined...
-
In vivo performance of intraperitoneal onlay mesh after ventral hernia repair
PublikacjaBackground: Ventral hernia repair needs to be improved since recurrence, postoperative pain and other complications are still reported in many patients. The behavior of implants in vivo is not sufficiently understood to design a surgical mesh mechanically compatible with the human abdominal wall. Methods: This analysis was based on radiological pictures of patients who underwent laparoscopic ventral hernia repair. The pictures...
-
A novel in vivo approach to assess strains of the human abdominal wall under known intraabdominal pressure
PublikacjaThe study concerns mechanical behaviour of a living human abdominal wall. A better mechanical understanding of a human abdominal wall and recognition of its material properties is required to find mechanically compatible surgical meshes to significantly improve the treatment of ventral hernias. A non-invasive methodology, based on in vivo optical measurements is proposed to determine strains of abdominal wall corresponding to...
-
Chiral analysis of chloro intermediates of methylamphetamine by one-dimensional and multidementional NMR and GC/MS
PublikacjaImpurity profiling and classification of abused drugs using chiral analytical techniques is of particular interest and importance because of the additional information obtained fromthis approach. When these methods are applied to the synthesis of illicitly used substances, they can supply valuable information about the conditions/chemicals used in the synthesis. We have applied GC and NMR methods to the study of intermediates found...
-
Algorithms of chemicals detection using raman spectra
PublikacjaRaman spectrometers are devices which enable fast and non-contact identification of examined chemicals. These devices utilize the Raman phenomenon to identify unknown and often illicit chemicals (e.g. drugs, explosives)without the necessity of their preparation. Now, Raman devices can be portable and therefore can be more widely used to improve security at public places. Unfortunately, Raman spectra measurements is a challenge...
-
Decisional-DNA Based Smart Production Performance Analysis Model
Publikacjan order to allocate resources effectively according to the production plan and to reduce disturbances, a framework for smart production performance analysis is proposed in this article. Decisional DNA based knowledge models of engineering objects, processes and factory are developed within the proposed framework. These models are the virtual representation of manufacturing resources, and with help of Internet of Things, are capable...
-
Early Stages of RNA-Mediated Conversion of Human Prions
PublikacjaPrion diseases are characterized by the conversion of prion proteins from a PrPC fold into a disease-causing PrPSC form that is self-replicating. A possible agent to trigger this conversion is polyadenosine RNA, but both mechanism and pathways of the conversion are poorly understood. Using coarse-grained molecular dynamic simulations we study the time evolution of PrPC over 600 μs. We find that both the D178N mutation and interacting...
-
Massive surveillance data processing with supercomputing cluster
PublikacjaIn recent years, increasingly complex algorithms for automated analysis of surveillance data are being developed. The rapid growth in the number of monitoring installations and higher expectations of the quality parameters of the captured data result in an enormous computational cost of analyzing the massive volume of data. In this paper a new model of online processing of surveillance data streams is proposed, which assumes the...
-
MiMSeg - an algorithm for automated detection of tumor tissue on NMR apparent diffusion coefficient maps.
Publikacja -
Acceleration of decision making in sound event recognition employing supercomputing cluster
PublikacjaParallel processing of audio data streams is introduced to shorten the decision making time in hazardous sound event recognition. A supercomputing cluster environment with a framework dedicated to processing multimedia data streams in real time is used. The sound event recognition algorithms employed are based on detecting foreground events, calculating their features in short time frames, and classifying the events with Support...
-
Fast collaborative graph exploration
PublikacjaWe study the following scenario of online graph exploration. A team of k agents is initially located at a distinguished vertex r of an undirected graph. At every time step, each agent can traverse an edge of the graph. All vertices have unique identifiers, and upon entering a vertex, an agent obtains the list of identifiers of all its neighbors. We ask how many time steps are required to complete exploration, i.e., to make sure...
-
Medical Image Segmentation Using Deep Semantic-based Methods: A Review of Techniques, Applications and Emerging Trends
PublikacjaSemantic-based segmentation (Semseg) methods play an essential part in medical imaging analysis to improve the diagnostic process. In Semseg technique, every pixel of an image is classified into an instance, where each class is corresponded by an instance. In particular, the semantic segmentation can be used by many medical experts in the domain of radiology, ophthalmologists, dermatologist, and image-guided radiotherapy. The authors...
-
On analysis of nanocomposite conical structures
PublikacjaThis research examines the analysis of rotating truncated conical baskets reinforced by carbon nanotubes around the two independent axes. A time-dependent analysis is considered, and the nonlinear dynamic governing equations are extracted using the energy method. Carbon nanotubes (CNTs) reinforced the conical basket, and the structure's mechanical properties are determined based on the several distributions of carbon nanotubes....
-
Theory and implementation of a virtualisation level Future Internet defence in depth architecture
PublikacjaAn EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...
-
Validation of a virtual test environment for C2X communication under radio jamming conditions
PublikacjaIn this paper, we propose a novel car-2-x communication security testing methodology in the physical layer of wireless systems. The approach is dedicated to automated testing of autonomous vehicles and it is essential for such complex systems operation, especially with regard to safety and security issues. It is based on scenario-driven testing in virtual and real test environments created from collected or simulated data. The...
-
Semantic Analysis and Text Summarization in Socio-Technical Systems
PublikacjaIn this chapter the authors present the results of the development the methodology for increasing the reliability of the functioning of the Socio-Technical System. The existed methods and algorithms for processing unstructured (textual) information were studied. Taking into account noted above strengths and weaknesses of Discriminant and Probabilistic approaches of Latent Semantic Relations analysis in of the summarization projection...
-
Evaluation of compression realization in diesel engine based on performance indicator changes
PublikacjaIn the article a method of evaluation of a diesel engine during the realization of processes of working cycle on the example of compression is described. The method is based on the use of the quantity called performance indicator in the description of the engine's work, which contains the information on the energy values, which may be disposed using the engine and the time at which it can be delivered. Theoretical information has...
-
Uprawnienie do uzyskania od administratora informacji o odbiorcach lub o kategoriach odbiorców a cele prawa dostępu do danych. Glosa do wyroku TS z dnia 12 stycznia 2023 r., C-154/21 (RW przeciwko Österreichische Post AG)
PublikacjaGiven the complexity of modern data processing, individuals often do not know to whom controllers provide the information collected about them. In the commented judgment, the Court ruled that the controller is bound by the data subjects’ request to access information about the identity of the specific recipients of their data and has limited ability to provide them with information about the categories of recipients. This interpretation...
-
Broadcast copies reveal the quantumness of correlations
PublikacjaWe study the quantumness of bipartite correlations by proposing a quantity that combines a measure of total correlations-mutual information-with the notion of broadcast copies-i.e., generally nonfactorized copies-of bipartite states. By analyzing how our quantity increases with the number of broadcast copies, we are able to classify classical, separable, and entangled states. This motivates the definition of the broadcast regularization...
-
PRINCIPLES OF ARTIFICIAL INTELLIGENCE APPLICATION IN CONTROL OF THE ENTERPRISE
PublikacjaThe implementation of the tasks of evaluating historical financial information, the control or audit of business activities are based primarily on professional judgments about the object of study of a professional accountant or auditor. Their findings are drawn on the basis of the study of documents, the use of audit evidence, risk assessment, etc. There is always a probability (and rather high) that professional judgment will...
-
Automatic Detection and Monitoring of Cyanobacterial Blooms in the Context of the Marine Cadastre
PublikacjaIn the wake of the European and global spatial data infrastructures (SDI) it is important to build information systems which use and serve thematic data in compliance with the INSPIRE Directive. In the context of hydrographic data, the Directive requires EU member states to collect and share information on maritime areas divided into regions and sub-regions, as well as coastal zone management areas. These data are part of recently...
-
Testing of the longest span soil-steel bridge in Europe – new quality in measurements
PublikacjaThe article describes interdisciplinary and comprehensive diagnostic tests of final bridge inspection and acceptance proposed for a soil – steel bridge made of corrugated sheets, being the European span length record holder (25.74 m). As an effect of an original concept a detailed and precise information about the structure response was collected. The load test design was based on the nonlinear numerical simulations performed by...
-
Stimulated by cyclodextrins high yield synthesis of azocrown analogues comprising pyrrole or imidazole residues
PublikacjaThe influence of cyclodextrins (CDs) on the formation of azocrown ethers comprising pyrrole, imidazole and substituted imidazole has been studied. Pyrrole, imidazole, 2-methyl-, 4-methyl- and 4-phenylimidazole were coupled with bisdiazonium salts derived from bis-1,5-(2-aminophenoxy)-3-oxapentane or bis-1,8-(2-aminophenoxy)-3,6-dioxaoctane to form macrocyclic compounds with two azo units. The syntheses were performed under standard...
-
Decision making techniques for electronic communication: an example for Turkey
PublikacjaCommunication is the way for people exchanging information with each other by using various tools. Electronic communication or Ecommunication is the process of sending, receiving and processing information or messages electronically. Electronic communication that is closely related to the development levels of countries, has made considerable progress especially in terms technology, innovation and entrepreneur. In this study, it...
-
Mechanizmy bezpieczeństwa transmisji w systemie netBaltic
Publikacjaartykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
An Evaluation Engine for Dynamic Ranking of Cloud Providers
PublikacjaThe paper focuses on creation of an effective dynamic ranking service for IaaS, PaaS and SaaS cloud providers. It considers building a quality model for this purpose along with definition of quality measure- ment procedures. The paper discusses several techniques known from already existing price comparison engines that could be modified and adopted for comparison of cloud providers. A technique for filtering measured data is proposed,...
-
Distributed Representations Based on Geometric Algebra: the Continuous Model
PublikacjaAuthors revise the concept of a distributed representation of data as well as two previously developed models: Holographic Reduced Representation (HRR) and Binary Spatter Codes (BSC). A Geometric Analogue (GAc - ''c'' stands for continuous as opposed to its discrete version) of HRR is introduced - it employs role-filler binding based on geometric products. Atomic objects are real-valued vectors in n-dimensional Euclidean space...
-
Study of Multi-Class Classification Algorithms’ Performance on Highly Imbalanced Network Intrusion Datasets
PublikacjaThis paper is devoted to the problem of class imbalance in machine learning, focusing on the intrusion detection of rare classes in computer networks. The problem of class imbalance occurs when one class heavily outnumbers examples from the other classes. In this paper, we are particularly interested in classifiers, as pattern recognition and anomaly detection could be solved as a classification problem. As still a major part of...
-
Feature extraction in detection and recognition of graphical objects
PublikacjaDetection and recognition of graphic objects in images are of great and growing importance in many areas, such as medical and industrial diagnostics, control systems in automation and robotics, or various types of security systems, including biometric security systems related to the recognition of the face or iris of the eye. In addition, there are all systems that facilitate the personal life of the blind people, visually impaired...
-
Architektura bezpieczeństwa systemu netBaltic
PublikacjaW artykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
SOLAP GIS in maritime research
PublikacjaMultidimensional Geographical Information System is a system especially designed to acquire, distribute, analyze and visualize complicated spatio-temporal data. Modern Geographical Information System technology can provide easy-to-use, near real-time solutions to many problems from different areas of research. In the article, authors summarize recent works on Spatial Online Analytical Processing (SOLAP) and multidimensional Geographical...
-
Kontekstowo zorientowany model bezpieczeństwa systemów internetowych
PublikacjaW rozprawie dokonano analizy usługowych systemów internetowych pod względem bezpieczeństwa. Przedstawiono autorskie uniwersalne modele bezpieczeństwa CoRBAC oraz jego rozszerzenie TCoRBAC, będące rozwinięciem tradycyjnego modelu RBAC. Uwzględniono analizę szeroko rozumianego kontekstu funkcjonowania systemu oraz poziom jego zaufania do użytkownika. Opracowano metodę wyznaczania dwóch parametrów: zaufania do systemu (λ) będącego...
-
New RFID readers for scalable RFID system
PublikacjaRFID systems gives the opportunity to have wide access control integrated with the monitoring of people and goods flow. System's scalability is one of the most important features in such systems as they enable large scale deployments. The concept of the proposed reader's architecture employs new RFID transceivers and microcontrollers, security algorithms which gives very high functionality at low price. Special treatment of system's...
-
The symmetric extendibility of quantum states
PublikacjaStudies on the symmetric extendibility of quantum states have become particularly important in the context of the analysis of one-way quantum measures of entanglement, and the distillability and security of quantum protocols. In this paper we analyze composite systems containing a symmetric extendible part, with particular attention devoted to the one-way security of such systems. Further, we introduce a new one-way entanglement...
-
Testy platformy SAN dla sektora elektroenergetycznego
PublikacjaWspółczesna infrastruktura elektroenergetyczna jest narażona na zagrożenia związane z dużą liczbą nowych luk i słabo- ści architektonicznych wynikających z szerszego wykorzystania technologii informacyjnych i komunikacyjnych (ang. Information and Communication Technologies – ICT). Połączenie infrastruktury elektroenergetycznej z Internetem naraża ją na nowe rodzaje ataków, takie jak ataki typu APT (ang. Advanced Persistent Threats)...
-
Development of the System Assurance Reference Model for Generating Modular Assurance Cases
PublikacjaAssurance cases are structured arguments used to demonstrate specific system properties such as safety or security. They are used in many industrial sectors including automotive, aviation and medical devices. Larger assurance cases are usually divided into modules to manage the complexity and distribute the work. Each of the modules is developed to address specific goals allocated to the specific objects i.e. components of the...
-
Autonomous port management based AGV path planning and optimization via an ensemble reinforcement learning framework
PublikacjaThe rapid development of shipping trade pushes automated container terminals toward the direction of intelligence, safety and efficiency. In particular, the formulation of AGV scheduling tasks and the safety and stability of transportation path is an important part of port operation and management, and it is one of the basic tasks to build an intelligent port. Existing research mainly focuses on collaborative operation between...
-
Mathematical Modeling of Ice Dynamics as a Decision Support Tool in River Engineering
PublikacjaThe prediction of winter flooding is a complicated task since it is affected by many meteorological and hydraulic factors. Typically, information on river ice conditions is based on historical observations, which are usually incomplete. Recently, data have been supplemented by information extracted from satellite images. All the above mentioned factors provide a good background of the characteristics of ice processes, but are not...
-
Fake News: Possibility of Identification in Post-Truth Media Ecology System
PublikacjaThe main aim of the article is identification of the attitudes towards the processes of identification and verification of fake news in the environment of digital media. The subject of the research refers to the users’ attitudes towards fake news. As indicated by the research, the attitudes towards fake news are not unambiguous. About 2/3 of the respondents claim that they are not able to distinguish fake news from true information;...
-
Eurozone or National Inflation Projections: Which has Greater Impact on Consumer Expectations?
PublikacjaWe compare the dependence of consumer inflation expectations on European Central Bank (ECB) inflation projections with that on national central bank (NCB) projections in four economies: Austria, Belgium, Finland, and Germany. We aim to assess whether the information published by central banks affects consumers, and whether inflation projections published by NCBs are more relevant to consumers than those published for the entire...
-
Interactions in Ternary Aqueous Solutions of NMA and Osmolytes—PARAFAC Decomposition of FTIR Spectra Series
PublikacjaIntermolecular interactions in aqueous solutions are crucial for virtually all processes in living cells. ATR-FTIR spectroscopy is a technique that allows changes caused by many types of such interactions to be registered; however, binary solutions are sometimes difficult to solve in these terms, while ternary solutions are even more difficult. Here, we present a method of data pretreatment that facilitates the use of the Parallel...
-
Mechanizmy bezpieczeństwa w strefie C systemu netBaltic
PublikacjaW artykule zaprezentowano rozwiązania zaimplementowane do zabezpieczania komunikacji w warunkach sporadycznej i nieciągłej łączności (Delay Tolerant Networking – DTN) w systemie netBaltic - charakterystycznej dla strefy C tego systemu. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych, architektura bezpieczeństwa całego systemu została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI),...