Filtry
wszystkich: 337
wybranych: 328
-
Katalog
Filtry wybranego katalogu
Wyniki wyszukiwania dla: SECURITY REQUIREMENTS
-
Badanie sieci świadomości sytuacyjnej dla infrastruktury elektroenergetycznej
PublikacjaWspółczesne systemy elektroenergetyczne są narażone na nowe rodzaje zagrożeń. Są one spowodowane lukami w zabezpieczeniach oraz słabościami architektonicznymi związanymi z szerszym zastosowaniem technologii teleinformatycznych (ICT) w tych systemach. Połączenie sieci elektroenergetycznych z Internetem naraża je na nowego rodzaju niebezpieczeństwa, takie jak ataki APT (ang. Advanced Persistent Threats) lub rozproszona odmowa usługi...
-
The KLC Cultures, Tacit Knowledge, and Trust Contribution to Organizational Intelligence Activation
PublikacjaIn this paper, the authors address a new approach to three organizational, functional cultures: knowledge culture, learning culture, and collaboration culture, named together the KLC cultures. Authors claim that the KLC approach in knowledge-driven organizations must be designed and nourished to leverage knowledge and intellectual capital. It is suggested that they are necessary for simultaneous implementation because no one of...
-
Greencoin: a Proenvironmental Action-Reward System
PublikacjaThe massive destruction of the natural environment is rapidly eroding the world’s capacity to provide food and water, threatening the security of billions of people. In order to facilitate green lifestyles – understood in terms of both pro-environmental behaviors and green self-image on the one hand, and to build sustainable local and global communities, on the other, we put forward an idea of a novel action-reward system based...
-
Zastosowanie szablonów Trust Case w pracy z normą BS 7799
PublikacjaTrust Case stanowi strukturę danych zawierającą argumentację oraz związany z nią materiał dowodowy uzasadniający, że interesujący nas obiekt (system, infrastruktura, organizacja) posiada wskazane własności. Wykorzystanie Trust Case do analizy i uzasadniania zaufania do systemów IT jest przedmiotem aktywnych badań. Podejście to znalazło zastosowanie w stosunku do systemów związanych z bezpieczeństwem (ang. safety critical), a ostatnio...
-
Protection System Design of Induction Motor for Industries
PublikacjaThe fundamental and durable structures of induction motor, as well as their low manufacturing cost, make them popular components in a wide range of current applications. Providing a safety net for employees is a must-have for businesses. This project’s motivation for improvement is to provide industrial motors, lift motors, pumps, and so on with safety. An induction motor’s primary goal is to protect it from problems, such as...
-
Audio content analysis in the urban area telemonitoring system
PublikacjaArtykuł przedstawia możliwości rozwinięcie monitoringu miejskiego o automatyczną analizę dźwięku. Przedstawiono metody parametryzacji dźwięku, które możliwe są do zastosowania w takim systemie oraz omówiono aspekty techniczne implementacji. W kolejnej części przedstawiono system decyzyjny oparty na drzewach zastosowany w systemie. System ten rozpoznaje dźwięki niebezpieczne (strzał, rozbita szyba, krzyk) wśród dźwięków zarejestrowanych...
-
Improved RSS-Based DoA Estimation Accuracy in Low-Profile ESPAR Antenna Using SVM Approach
PublikacjaIn this paper, we have shown how the overall performance of direction-of-arrival (DoA) estimation using lowprofile electronically steerable parasitic array radiator (ESPAR) antenna, which has been proposed for Internet of Things (IoT) applications, can significantly be improved when support vector machine (SVM) approach is applied. Because the SVM-based DoA estimation method used herein relies solely...
-
Protection System Design of Induction Motor for Industries
PublikacjaThe fundamental and durable structures of induction motor, as well as their low manufacturing cost, make them popular components in a wide range of current applications. Providing a safety net for employees is a must-have for businesses. This project’s motivation for improvement is to provide industrial motors, lift motors, pumps, and so on with safety. An induction motor’s primary goal is to protect it from problems, such as...
-
Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection
PublikacjaAs a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used method for identifying Android malware is signature-based detection. The drawback of this method, however, is that it is unable to detect unknown malware. As a consequence of this problem,...
-
Automatic recognition of males and females among web browser users based on behavioural patterns of peripherals usage
PublikacjaPurpose The purpose of this paper is to answer the question whether it is possible to recognise the gender of a web browser user on the basis of keystroke dynamics and mouse movements. Design/methodology/approach An experiment was organised in order to track mouse and keyboard usage using a special web browser plug-in. After collecting the data, a number of parameters describing the users’ keystrokes, mouse movements and clicks...
-
Edible dragonflies and damselflies (order Odonata) as human food – A comprehensive review
PublikacjaThe rapid growth of the human population leads to a big concern about the food y and demand worldwide. However, due to the reduction in global arable land area, humans need to find alternative food sources to fulfil their needs. Consequently, edible insects have been identified as a promising solution to ameliorate food security and increase global nutrition. Among more than 2,100 identified edible insect species, dragonflies and...
-
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublikacjaCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...
-
A Simple Neural Network for Collision Detection of Collaborative Robots
PublikacjaDue to the epidemic threat, more and more companies decide to automate their production lines. Given the lack of adequate security or space, in most cases, such companies cannot use classic production robots. The solution to this problem is the use of collaborative robots (cobots). However, the required equipment (force sensors) or alternative methods of detecting a threat to humans are usually quite expensive. The article presents...
-
RSS-Based DoA Estimation Using ESPAR Antenna for V2X Applications in 802.11p Frequency Band
PublikacjaIn this paper, we have proposed direction-of arrival (DoA) estimation of incoming signals for V2X applications in 802. 11p frequency band, based on recording of received signal strength (RSS) at electronically steerable parasitic array radiator (ESPAR) antenna's output port. The motivation of the work was to prove that ESPAR antenna used to increase connectivity and security in V2X communication can...
-
Sensors for Rapid Detection of Environmental Toxicity in Blood of Poisoned People
PublikacjaRecently, the diagnosis and treatment of poisoned person can be done only in specialized centers. Furthermore, currently used clinical methods of intoxication diagnosis are not sufficient for early detection. Conventional laboratory tests based on urine and blood require professional, high skilled staff, high cost equipment as well as they are arduous and lasting analytical procedures. There is a need to elaborate relatively cheap...
-
Technological solutions to landfill management: Towards recovery of biomethane and carbon neutrality
PublikacjaInadequate landfill management poses risks to the environment and human health, necessitating action. Poorly designed and operated landfills release harmful gases, contaminate water, and deplete resources. Aligning landfill management with the Sustainable Development Goals (SDGs) reveals its crucial role in achieving various targets. Urgent transformation of landfill practices is necessary to address challenges like climate change,...
-
Functional safety and managing competence
PublikacjaSą nowe wyzwania związane z badaniami, edukacją i szkoleniem w obszarach bezpieczeństwa i ochrony systemów i sieci krytycznych. W rozdziale podkreśla się, że kompetencje specjalistów powinny być kształtowane w zintegrowanych procesach edukacji i szkolenia. Dlatego uzasadnione jest, aby opracować w Europie standardy i programy kształcenia na bazie odpowiednich prac badawczych i najlepszych doświadczeń z praktyki przemysłowej w celu...
-
Renewable Energy in the Pomerania Voivodeship—Institutional, Economic, Environmental and Physical Aspects in Light of EU Energy Transformation
PublikacjaIn the era of globalization and rapid economic growth, affecting most world economies, increased production and consumption are leading to higher levels of energy production and consumption. The growing demand for energy means that energy resources from conventional sources are not sufficient; moreover, its production generates high costs and contributes to the emission of greenhouse gases and waste. In view of the above, many...
-
System of monitoring of the Forest Opera in Sopot structure and roofing
PublikacjaThe authors present a solution realized in Forest Opera (name in Polish: Opera Leśna) in Sopot (Poland) in connection with the modernization and construction of a new roof. The complicated structure of the roof of the facility and the used covering in form of membrane made of technical fabric required (for security reasons) to install the unit of devices allowing for the continuous geodetic monitoring of the facility. Monitoring...
-
The Russian Federation in European Union Programmes
PublikacjaSince the early 1990s, the European Union has been supporting socio-economic transformations in the former Soviet Union states, including the Russian Federation. Initially, this assistance was provided in the framework of the TACIS Programme, offering long-term, non-repayable aid. In 1991–2006 Russia received EUR 2.7bn for the restructuring of the state enterprise sector, establishment of private companies, state administration...
-
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
PublikacjaBiometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...
-
Autonomous port management based AGV path planning and optimization via an ensemble reinforcement learning framework
PublikacjaThe rapid development of shipping trade pushes automated container terminals toward the direction of intelligence, safety and efficiency. In particular, the formulation of AGV scheduling tasks and the safety and stability of transportation path is an important part of port operation and management, and it is one of the basic tasks to build an intelligent port. Existing research mainly focuses on collaborative operation between...
-
Wpływ barier ochronnych na poziom bezpieczeństwa ruchu drogowego
PublikacjaWypadki drogowe wciąż stanowią znaczną przyczynę zgonów, dlatego bardzo ważnym jest odpowiednie kształtowanie otoczenia drogi – by mogło ono uzyskać miano „wybaczającego”. Artykuł stanowi wprowadzenie do tematyki drogowych barier ochronnych, i jest częścią pracy dyplomowej realizowanej na Politechnice Gdańskiej, w ramach której autorzy analizują zależności pomiędzy wypadkami a omawianymi urządzeniami BRD. W artykule przedstawiono...
-
Koncepcja zdalnego sterowania i monitoringu urządzeń trakcyjnych z wykorzystaniem technologii teleinformatycznych
PublikacjaAdvancement in wireless communication enables engineers to apply sophisticated and relatively inexpensive technologies in new fields of industry, which were previously designated solely to wire-based solutions. One of those fields is railway transportation system. In effect of a high reliability and safety demands, this area was resistive to new technologies. Nowadays, increased security and reliability of wireless sensor networks...
-
Influence of Thermal Imagery Resolution on Accuracy of Deep Learning based Face Recognition
PublikacjaHuman-system interactions frequently require a retrieval of the key context information about the user and the environment. Image processing techniques have been widely applied in this area, providing details about recognized objects, people and actions. Considering remote diagnostics solutions, e.g. non-contact vital signs estimation and smart home monitoring systems that utilize person’s identity, security is a very important factor....
-
Impact of laser beam welding on mechanical behaviour of 2.25Cr–1Mo (P22) steel
PublikacjaThe use of welding processes in the manufacturing and repair of structures intended for the energy industry plays a key role in the guarantee of a continuous supply of fossil fuels, which is the basic condition for ensuring energy security. A square butt joint of 10 mm thick plate of 2.25Cr–1Mo (P22) steel was fabricated by autogenous laser beam welding process and then post-weld heat treatment (PWHT) for two sets of process parameters...
-
Energy policy and the role of bioenergy in Poland
PublikacjaPrzedstawiono sytuacje energetyczną kraju. Omówiono poszczególne sektory wytwarzania energii oraz zapotrzebowania na energię i paliwa. Omówiono przekształcenia sektorów energetycznych w Polsce na przestrzeni lat 1990-2002. Na tym tle przedstawiono techniczne, ekonomiczne, społeczne i prawne aspekty rozwoju energetyki źródeł odnawialnych a w szczególności opartych o bioenergię. Przedstawiono wnioski dla Polski płynące z dotychczasowych...
-
Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej
PublikacjaW monografii przedstawiono aktualną problematykę związaną z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej w obiektach i systemach infrastruktury krytycznej, wykorzystujących przemysłową sieć komputerową, z uwzględnieniem zagadnień ochrony informacji. W obiektach tego typu systemy sterowania i automatyki zabezpieczeniowej są projektowane jako systemy rozproszone, których nieprawidłowe...