Filtry
wszystkich: 691
wybranych: 450
-
Katalog
- Publikacje 450 wyników po odfiltrowaniu
- Czasopisma 106 wyników po odfiltrowaniu
- Konferencje 80 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 29 wyników po odfiltrowaniu
- Projekty 8 wyników po odfiltrowaniu
- Kursy Online 11 wyników po odfiltrowaniu
- Dane Badawcze 6 wyników po odfiltrowaniu
Filtry wybranego katalogu
Wyniki wyszukiwania dla: security
-
A survey of neural networks usage for intrusion detection systems
PublikacjaIn recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...
-
A model-based approach to analysis of authentication protocols.
PublikacjaW referacie przedstawiono zintegrowane podejście do analizy protokołów uwierzytelniania o nazwie Object-oriented Formal Authentication Protocol Security Analysis Framework (OF-APSAF). Podejście to jest zaprojektowane na bazie sprawdzonej metody formalnej CSP wraz z narzędziami ją wspierającymi: Casper oraz FDR. Jego integralną częścią jest półformalna zorientowana obiektowo technika modelowania protokołów, ich kontekstu oraz wymagań...
-
Electricity demand prediction by multi-agent system with history-based weighting
PublikacjaEnergy and load demand forecasting in short-horizons, over an interval ranging from one hour to one week, is crucial for on-line scheduling and security functions of power system. Many load forecasting methods have been developed in recent years which are usually complex solutions with many adjustable parameters. Best-matching models and their relevant parameters have to be determined in a search procedure. We propose a hybrid...
-
Integration and Visualization of the Results of Hydrodynamic Models in the Maritime Network-Centric GIS of Gulf of Gdansk
PublikacjaEnsuring of security in the coastal area makes on a seaside countries research in the field of infrastructure spatial information of environmental data. The paper presents the results of work on the construction of this infrastructure by integrating electronic navigational chart with ortophotomaps of coastal areas as well as numerical data from weather and hydrodynamic models. Paper focuses on a problems associated with creating...
-
Health monitoring services based on off-the-shelf mobile devices
PublikacjaDevelopment of health monitoring systems usually involves usage of dedicated devices with provided guarantees in terms of their reliability. Those devices raise the cost of the whole system, because of which such platforms are limited only to specific areas and constrained number of users. Usage of off-the- shelf devices could lower the cost and bring those systems to the masses. The paper covers possible uses of common off-the-shelf...
-
Coastal zone monitoring using Sentinel-1 SAR polarymetry data
PublikacjaIn recent years the role of the surveillance and security of Polish boundaries has significantly increased. Polish coastal zone monitoring requires various approaches using various technological means in order to ensure the protection of Polish boundaries. In this paper, the authors discuss and present alternatives to underwater surveillance methods of coastal area analysis and monitoring using data retrieved from the newly developed...
-
ADAPTIVE PREDICTIONS OF THE EURO/ZŁOTY CURRENCY EXCHANGE RATE USING STATE SPACE WAVELET NETWORKS AND FORECAST COMBINATIONS
PublikacjaThe paper considers the forecasting of the euro/Polish złoty (EUR/PLN) spot exchange rate by applying state space wavelet network and econometric forecast combination models. Both prediction methods are applied to produce one-trading-day- ahead forecasts of the EUR/PLN exchange rate. The paper presents the general state space wavelet network and forecast combination models as well as their underlying principles. The state space...
-
A fair distribution scheme for joint fingerprinting and decryption methods= Sprawiedliwy schemat dystrybucji dla metod łącznego osadzania odcisku palca oraz deszyfracji
PublikacjaThe paper addresses the fairness of the security provided by digital fingerprinting methods. It was noted that the digital fingerprinting techniques are designed primarily to protect service providers against the actions of malicious users, while honest users remain vulnerable to acts of malicious providers. The paper describes the customer's rights problem and the unbinding problem, which also apply to joint fingerprinting and...
-
Stradar - Multimedia Dispatcher and Teleinformation System for the Border Guard
PublikacjaSecurity of national borders requires utilization of multimedia surveillance systems automatically gathering, processing and sharing various data. The paper presents such a system developed for the Maritime Division of the Polish Border Guard within the STRADAR project. The system, apart from providing communication means, gathers data, such as map data from AIS, GPS and radar receivers, videos and photos from camera or audio from...
-
Functional safety with cybersecurity for the control and protection systems on example of the oil port infrastructure
PublikacjaSafety and cybersecurity aspects consist of two different group of functional requirements for the industrial control and protection systems in the oil port installation. It is the main reason why the analyses of safety and cybersecurity shouldn’t be integrated directly. These article presented some important issues of the functional safety analysis with regard to cybersecurity aspects in the oil seaport infrastructure. The proposed...
-
The Impact of Ergonomic Guiding Principles on the Formation of Modern Monumental Art
PublikacjaCommemoration of historic events is now a commonplace phenomenon both in culture and in academic research. The phenomenon is linked to an increase in the representation of the visualisation of the past in public sphere, which in turn leads to reformulation of monumental art. Modern monuments are often spatial forms consisting both of sculpture installation and bigger constructions. In case of these realisations, the designers,...
-
Deep Learning: A Case Study for Image Recognition Using Transfer Learning
PublikacjaDeep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...
-
Deep Learning
PublikacjaDeep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...
-
I, Robot: between angel and evil
PublikacjaThe boosting of most digital innovations within recent technology progress by artificial intelligence (AI) constitutes a growing topic of interest. Besides its technical aspects, increasing research activity may be observed in the domain of security challenges, and therefore of responsibility related to the controlled or hypothetically uncontrolled or autonomous emergence of AI solutions. Consequently, responsibility and ethics...
-
Techniczne aspekty implementacji nowoczesnej platformy e-learningowej
PublikacjaZaprezentowano aspekty techniczne implementacji nowoczesnej platformy nauczania zdalnego. Omówiono obszary funkcjonalne takie jak: system zarządzania nauczaniem, serwis informacyjny, dodatkowe oprogramowanie dydaktyczne oraz kolekcja zasobów multimedialnych. Przybliżono zagadnienia związane z bezpieczeństwem takiej platformy. Na końcu przedstawiono parametry techniczne wdrożonej na Politechnice Gdańskiej platformy eNauczanie.
-
Verification of the Parameterization Methods in the Context of Automatic Recognition of Sounds Related to Danger
PublikacjaW artykule opisano aplikację, która automatycznie wykrywa zdarzenia dźwiękowe takie jak: rozbita szyba, wystrzał, wybuch i krzyk. Opisany system składa się z bloku parametryzacji i klasyfikatora. W artykule dokonano porównania parametrów dedykowanych dla tego zastosowania oraz standardowych deskryptorów MPEG-7. Porównano też dwa klasyfikatory: Jeden oparty o Percetron (sieci neuronowe) i drugi oparty o Maszynę wektorów wspierających....
-
OCHRONA PRYWATNOŚCI W SYSTEMACH MONITORINGU WIZYJNEGO, PRZEGLĄD OPRACOWANYCH ARCHITEKTUR I ALGORYTMÓW
PublikacjaNieustannie rozwijające się technologie informacyjne związane z inteligentnym monitoringiem wizyjnym stwarzają ryzyko niewłaściwego wykorzystywania danych osobowych. W celu zapewnienia prawidłowej ochrony materiału wizyjnego, w ramach projektów realizowanych w Katedrze Systemów Multimedialnych WETI PG, opracowany został szereg architektur i algorytmów, które ułatwiają ochronę danych wrażliwych, takich jak: wizerunki osób, numery...
-
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublikacjaAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
Towards the value-based design of on-line services
PublikacjaThe paper identifies economic factors shaping customer bahaviour in on-line services in two interrelated dimensions; (1) economic needs and requirements, relevant to expected benefits and values perceived by customers; (2) technical components, allowing technical realization of on-line services. Technical components were cathegorized into four groups, creating so-called VIPR model: Visual, Interactive, Process and Relationship-relevant...
-
Resolving conflicts in object tracking for automatic detection of events in video
PublikacjaW referacie przedstawiono algorytm rozwiązywania konfliktów w śledzeniu obiektów ruchomych. Proponowana metoda wykorzystuje predykcję stanu obiektu obliczaną przez filtry Kalmana oraz dopasowuje wykryte obiekty do struktur śledzących ich ruch na podstawie deskryptorów koloru i tekstury. Omówiono specyficzne sytuacje powodujące konflikty, takie jak rozdzielanie obiektów. Przedstawiono wyniki testów. Algorytm może być zastosowany...
-
Realistic noise-tolerant randomness amplification using finite number of devices
PublikacjaRandomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...
-
Trustworthy Applications of ML Algorithms in Medicine - Discussion and Preliminary Results for a Problem of Small Vessels Disease Diagnosis.
PublikacjaML algorithms are very effective tools for medical data analyzing, especially at image recognition. Although they cannot be considered as a stand-alone diagnostic tool, because it is a black-box, it can certainly be a medical support that minimize negative effect of human-factors. In high-risk domains, not only the correct diagnosis is important, but also the reasoning behind it. Therefore, it is important to focus on trustworthiness...
-
On the fast BSS transition algorithms in the IEEE 802.11r local area wireless networks
PublikacjaHandover performance is critical to support multimedia services that are becoming increasingly available over the wireless devices. The high transition delay can be unaccepted for such services or can be a source of disruption on the session. On the other side, IEEE 802.11 standard is being extended with new functionalities. Security and QoS features, included in recent IEEE 802.11-2007 standard, add management frames that are...
-
Hazardous material-related propagation of the effects of train accidents in the subgrade
PublikacjaA large part of the transport of hazardous materials is carried out by rail. Therefore, the security of these transports is becoming increasingly important. Every catastrophe involving dangerous materials has a negative impact on the participants of the incident and the surrounding environment, because its range is generally not local. It follows that in the event of a catastrophe, its effects should be minimized and remediation...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublikacjaFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
Automatyczna weryfikacja klienta bankowego w oparciu o multimodalne technologie biometryczne
PublikacjaW referacie przedstawiono przegląd rozwiązań wykorzystywanych w bankach do weryfikacji tożsamości klientów. Ponadto zawarto opis metod biometrycznych aktualnie wykorzystywanych w placówkach bankowych wraz z odniesieniem do skuteczności i wygody korzystania z dostępnych rozwiązań. Zaproponowano rozszerzenie zakresu wykorzystania technologii biometrycznych, wskazując kierunek rozwoju systemów bezpieczeństwa dla poprawy dostępu do...
-
Mechanizmy komunikacji w rozproszonych systemach specjalnego przeznaczenia
PublikacjaZadania ochrony i bezpieczeństwa granic państwa realizowane przez Straż Graniczną wymagają wsparcia ze strony nowoczesnych systemów Technologii Informacyjnych (TI) uwarunkowanych ich specjalnym przeznaczeniem. Z uwagi na charakter tej służby, rozwiązania dla jej potrzeb muszą być realizowane jako systemy rozproszone umożliwiające przenoszenie i przetwarzanie informacji głosowych oraz różnorodnych danych, w tym specjalnego przeznaczenia....
-
Architecture of Request/Response and Publish/Subscribe System Capable of Processing Multimedia Streams
PublikacjaAnaliza ''w locie'' (ang. on-the-fly) strumieni multimedialnych, zawierających wysokiej jakości dane obrazu i dźwięku, wciąż stanowi wyzwanie dla projektantów oprogramowania. Praca przedstawia architekturę systemu zdolnego do przetwarzania w czasie rzeczywistym strumieni multimedialnych przy użyciu komponentów działających w architekturze Publish/Subscribe oraz Request/Response, korzystających z możliwości Java Multimedia Framework...
-
Interaction with medical data using QR-codes
PublikacjaBar-codes and QR-codes (Quick Response ) are often used in healthcare. In this paper an application of QR-codes to exchange of laboratory results is presented. The secure data exchange is proposed between a laboratory and a patient and between a patient and Electronic Health Records. Advanced Encryption Standard was used to provide security of data encapsulated within a QR-code. The experimental setup, named labSeq is described....
-
Algorithms of chemicals detection using raman spectra
PublikacjaRaman spectrometers are devices which enable fast and non-contact identification of examined chemicals. These devices utilize the Raman phenomenon to identify unknown and often illicit chemicals (e.g. drugs, explosives)without the necessity of their preparation. Now, Raman devices can be portable and therefore can be more widely used to improve security at public places. Unfortunately, Raman spectra measurements is a challenge...
-
Flexicurity. Elastyczność i bezpieczeństwo
PublikacjaFlexicurity to koncepcja łącząca elastyczność (flexibility) oraz bezpieczeństwo (security) na rynku pracy. Dokumenty strategiczne Unii Europejskiej wskazują, że docelowo funkcjonowanie europejskich rynków pracy będzie bazowało na modelu flexicurity. Koncepcja flexicurity łączy w sobie, dwa pozornie sprzeczne, pojęcia elastyczności i bezpieczeństwa. Opracowanie stanowi przegląd dokumentów Unii Europejskiej oraz publikacji naukowych...
-
On extending open source IMS platform for integrated IPTV and VoIP services over IPv6
PublikacjaEven when IMS is the most popular platform for multimedia services, the open versions of IMS ecosystem are lacking in specified functionalities for IPTVv6 and VoIPv6 services. In this paper, we extend current client and server open source software in order to provide reliability and security to these multimedia services. As a part of our work the IMS architecture for conferencing system with proposed mechanisms to improve system...
-
Integrating web site services into application through user interface
PublikacjaThe issue of integrating applications which are only accessible through visual user interface is not thoroughly researched. Integration of web applications running remotely and controlled by separate organizations becomes even more complicated, as their user interface can display differently in different browsers or change without prior notification as a result of application maintenance. While possible, it is generally not common...
-
Analysis of an Attenuator Artifact in an Experimental Attack by Gunn–Allison–Abbott Against the Kirchhoff-Law–Johnson-Noise (KLJN) Secure Key Exchange System
PublikacjaA recent paper by Gunn–Allison–Abbott (GAA) [L. J. Gunn et al., Scientific Reports 4 (2014) 6461] argued that the Kirchhoff-law–Johnson-noise (KLJN) secure key exchange system could experience a severe information leak. Here we refute their results and demonstrate that GAA’s arguments ensue from a serious design flaw in their system. Specifically, an attenuator broke the single Kirchhoff-loop into two coupled loops, which is an...
-
Implementation of integrated control In drinking water distribution systems - IT system proposal
PublikacjaImplementation of integrated control algorithms requires suitable hardware and software platforms. Proposed solution must allow realizing control and monitoring tasks, while ensuring high reliability and security of processed data. Additionally, the software and hardware solutions must be immune to outside influence. This paper presents an approach to implementation of control systems in drinking water distribution system. Presented...
-
Efficient removal of 2,4,6-trinitrotoluene (TNT) from industrial/military wastewater using anodic oxidation on boron-doped diamond electrodes
PublikacjaWith growing public concern about water quality particular focus should be placed on organic micropollutants, which are harmful to the environment and people. Hence, the objective of this research is to enhance the security and resilience of water resources by developing an efficient system for reclaiming industrial/military wastewater and protecting recipients from the toxic and cancerogenic explosive compound – 2,4,6-trinitrotoluene...
-
A Triplet-Learnt Coarse-to-Fine Reranking for Vehicle Re-identification
PublikacjaVehicle re-identification refers to the task of matching the same query vehicle across non-overlapping cameras and diverse viewpoints. Research interest on the field emerged with intelligent transportation systems and the necessity for public security maintenance. Compared to person, vehicle re-identification is more intricate, facing the challenges of lower intra-class and higher inter-class similarities. Motivated by deep...
-
Analysis of hydrodynamic pressure fields of motorboats and pontoons in shallow water
PublikacjaThe article presents the results of calculations of the pressure fields generated by a motorboat at the bottom of a shallow sea. Calculations were made using the boundary elements method (BEM), arranged on the surface of the boat and the bottom of the sea. This method is described in [3], and applied on a free surface linearized boundary condition. Results for four different lengths of motorboats, from 2.85 m to 9.5 m, sea depth...
-
Assembling and testing of quasi-static hybrid piezoelectric motor based on electroactive lubrication principle
PublikacjaThe presented paper concerns a novel concept of hybrid piezoelectric motor based on electroactive lubrication principle. Its structure is combined of quasi-static and resonance piezoelectric actuators, synchronizing their work to generate the rotary movement. The hybrid motor topology is compared to the existing piezoelectric motors, regarding its field of applications in embedded systems with very high security requirements. The...
-
Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej – wymagania i kryteria
PublikacjaNiniejsza praca poświęcona jest zagadnieniom zarządzania bezpieczeństwem funkcjonalnym w cyklu życia z uwzględnieniem norm międzynarodowych PN-ENIEC 61508 i PN-ENIEC 61511 oraz zarządzaniu bezpieczeństwem informacji w systemach i sieciach komputerowych w nawiązaniu do wytycznych OECD i wymagań normy PN-ISO/IEC 27001. Rozważa się przykłady skupionych i rozproszonych sieci komputerowych pełniących funkcje monitorowania, sterowania...
-
Comparison of state feedback and PID control of pressurizer water level in nuclear power plant
PublikacjaThe pressurizer water level control system in nuclear power plant with pressurized water reactor (PWR) is responsible for coolant mass balance. The main control goal is to stabilize the water level at a reference value and to suppress the effect of time-varying disturbances (e.g. coolant leakage in primary circuit pipeline system). In the process of PWR power plant operation incorrect water level may disturb pressure control or...
-
Multimodal Surveillance Based Personal Protection System
PublikacjaA novel, multimodal approach for automatic detection of abduction of a protected individual, employing dedicated personal protection device and a city monitoring system is proposed and overviewed. The solution is based on combining four modalities (signals coming from: Bluetooth, fixed and PTZ cameras, thermal camera, acoustic sensors). The Bluetooth signal is used continuously to monitor the protected person presence, and in case...
-
Threshold Attendance under Soft-Crash Model: TAG Protocol and Markovian Analysis
PublikacjaA realistic and systematic network evaluation should subsume an availability model and a failure model. We combine a "hard availability" model we call threshold attendance, whereby a certain minimum number of network elements must be present at any time, with a soft-crash failure model, whereby after experiencing a failure, a network element is still able to function correctly for a while in an emergency mode at a risk of a major...
-
Assurance Case Patterns On-line Catalogue
PublikacjaAssurance case is an evidence-based argument demonstrating that a given property of a system (e.g. safety, security) is assured. Assurance cases are developed for high integrity systems, as in many industry domains such argu-ment is explicitly required by regulations. Despite the fact that each assurance case is unique, several reusable argument patterns have been identified and pub-lished. This paper reports work on development...
-
Federated Learning in Healthcare Industry: Mammography Case Study
PublikacjaThe paper focuses on the role of federated learning in a healthcare environment. The experimental setup involved different healthcare providers, each with their datasets. A comparison was made between training a deep learning model using traditional methods, where all the data is stored in one place, and using federated learning, where the data is distributed among the workers. The experiment aimed to identify possible challenges...
-
Architecture of Request/Response and Publish/Subscribe System Capable of Processing Multimedia Streams
PublikacjaAbstrakt Analiza ''w locie'' (ang. on-the-fly) strumieni multimedialnych, zawierających wysokiej jakości dane obrazu i dźwięku, wciąż stanowi wyzwanie dla projektantów oprogramowania. Praca przedstawia architekturę systemu zdolnego do przetwarzania w czasie rzeczywistym strumieni multimedialnych przy użyciu komponentów działających w architekturze Publish/Subscribe oraz Request/Response, korzystających z możliwości Java Multimedia...
-
Scanning networks with cactus topology
PublikacjaThe family of Pursuit and Evasion problems is widelystudied because of its numerous practical applications,ranging from communication protocols to cybernetic andphysical security. Calculating the search number of a graphis one of most commonly analyzed members of this problemfamily. The search number is the smallest number of mobileagents required to capture an invisible and arbitrarily fastfugitive, for instance piece of malicious...
-
Multi-functional sensor based on photonic crystal fiber using plasmonic material and magnetic fluid
PublikacjaA unique highly sensitive photonic crystal fiber is investigated based on plasmonic material and magnetic fluid (MF) for the simultaneous measurement of temperature and magnetic field sensor. The designed sensor is explored by tracing the different parameters such as birefringence, coupling length, power spectrum, and the peak wavelength of the transmission intensity. The magnetic field and temperature computation are attained...
-
LTE and NB-IoT Performance Estimation Based on Indicators Measured by the Radio Module
PublikacjaMonitoring the operating parameters of power grids is extremely important for their proper functioning as well as for ensuring the security of the entire infrastructure. As the idea of the Internet of Things becomes more ubiquitous, there are tools for monitoring the state of the complex electrical grid and means to control it. There are also developed new measuring devices and transmission technologies allowing for the transfer...
-
Towards a process based management system for oil port infrastructure in context of insurance
PublikacjaThis article addresses selected methodological aspects of a process based management system based on analysis of hazards and threats and risk evaluation for an oil port infrastructure in context of insurance. The oil port terminal is regarded as important system of the critical infrastructure that require careful system oriented approach to deal with integrated aspects of environmental, safety and security management to reduce...
-
Improved RSS-Based DoA Estimation Accuracy in Low-Profile ESPAR Antenna Using SVM Approach
PublikacjaIn this paper, we have shown how the overall performance of direction-of-arrival (DoA) estimation using lowprofile electronically steerable parasitic array radiator (ESPAR) antenna, which has been proposed for Internet of Things (IoT) applications, can significantly be improved when support vector machine (SVM) approach is applied. Because the SVM-based DoA estimation method used herein relies solely on received signal strength...
-
Ranking of Generation Source Locations by a Hybrid Multi-Criteria Method
PublikacjaThe paper presents a ranking of the locations of eight renewable energy sources (RES) made using a hybrid multi-criteria analysis method. The method is a combination of the analytical hierarchical process (AHP) method and numerical taxonomy. The considered generating sources, i.e. solar plants, biogas plants, and wind farms are sources that will significantly contribute to implementing the provisions of the energy and climate package...
-
(Lost) Pride and Prejudice. Journalistic Identity Negotiation Versus the Automation of Content
PublikacjaThe objective of our research was to broaden the knowledge regarding the relationship between the work of journalists and their professional identity, and, in particular, to identify the attitudes of this professional group towards algorithmic content creation under conditions of liminality. Previously, the implementation of the technology of algorithmic content creation by media organisations was associated primarily with financial...
-
Systemy bezprzewodowej łączności i transmisji danych dla potrzeb bezpieczeństwa publicznego (studium stanu i rozwiązań)
PublikacjaW niniejszym rozdziale przedstawiono charakterystyki rozwiązań użytkowych zrealizowanych w Katedrze Systemów i Sieci Radiokomunikacyjnych Politechniki Gdańskiej. Autorzy scharakteryzowali opracowane przez zespół badawczy Katedry, systemy bezprzewodowego monitoringu zagrożeń bezpieczeństwa oraz zarządzania i sterowania infrastrukturami krytycznymi. W tym też kontekście omówiono następujące systemy i aplikacje użytkowe: − globalny...
-
Discouraging Traffic Remapping Attacks in Local Ad Hoc Networks
PublikacjaQuality of Service (QoS) is usually provided in ad hoc networks using a class-based approach which, without dedicated security measures in place, paves the way to various abuses by selfish stations. Such actions include traffic remapping attacks (TRAs), which consist in claiming a higher traffic priority, i.e., false designation of the intrinsic traffic class so that it can be mapped onto a higher-priority class. In practice, TRAs...
-
Searching for road deformations using mobile laser scanning
PublikacjaMillions of people use roads every day all over the world. Roads, like many other structures, have an estimated durability. In Poland a lot of the roads were built at the turn of the 20th and 21st c., especially for light cars. Many of these roads carry traffic and heavy goods vehicles which were not predicted when the traffic was first estimated. It creates a lot of problems with technical conditions and the infrastructure must...
-
An Off-Body Narrowband and Ultra-Wide Band Channel Model for Body Area Networks in a Ferryboat Environment
PublikacjaIn the article an off-body narrowband and ultra-wide band channel model for body area networks in a ferryboat environment is described. Considering the limited number of publications there is a need to develop an off-body channel model, which will facilitate the design of radio links, both from the multimedia services provider and the security point of view, for body area networks in this atypical environment. A mobile heterogeneous...
-
Market Price Prediction of Property Rights from Gas Fired Plants or Plants with Total Installed CHP Source Capacity Below 1 MW until 2025
PublikacjaThe resolution on the Polish Energy Policy until 2030 (PEP-30) was adopted by the Council of Ministers on 10 November 2009. The document specifies the combined electricity and heat generation as a direction of pursuing the goals of energy efficiency, fuel and energy supply security, competitive fuel and energy markets development, and reduction of the energy sector’s environmental impact. PEP-30 assumes that electricity generation...
-
Mitigating Traffic Remapping Attacks in Autonomous Multi-hop Wireless Networks
PublikacjaMultihop wireless networks with autonomous nodes are susceptible to selfish traffic remapping attacks (TRAs). Nodes launching TRAs leverage the underlying channel access function to receive an unduly high Quality of Service (QoS) for packet flows traversing source-to-destination routes. TRAs are easy to execute, impossible to prevent, difficult to detect, and harmful to the QoS of honest nodes. Recognizing the need for providing...
-
Functional Safety and Cybersecurity Analysis and Management in Smart Manufacturing Systems
PublikacjaThis chapter addresses some of the issues of the integrated functional safety and cybersecurity analysis and management with regard to selected references and the functional safety standards: IEC 61508, IEC 61511, ISO 13849-1 and IEC 62061, and a cybersecurity standard IEC 62443 that concerns the industrial automation and control systems. The objective is to mitigate the vulnerability of industrial systems that include the information...
-
Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents
PublikacjaElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...
-
A framework of open government data (OGD) e-service quality dimensions with future research agenda
PublikacjaPurpose This research paper aims to present a framework of open government data (OGD) relating to e-service quality dimensions. In addition, it provides a research agenda for the e-service delivery of OGD. Design/methodology/approach A literature review pertaining to e-service quality with special reference to e-government was delivered to deduce the key dimensions of e-service quality for OGD. Findings Five e-service quality dimensions...
-
New Challenges in Management and Economics in 21st century. Selected studies and examples
PublikacjaIn Chapter 1 authors describe the method used to assess the level of readiness of an organization to introduce the Lean Six Sigma concept supporting the Quality 4.0 assumptions, which is gaining more and more interest not only in large organizations, but also in the SME sector. Its use will be illustrated by the example of a small service company. Chapter 2 presents the characteristics of blockchain technology applications in the...
-
Society 4.0: Issues, Challenges, Approaches, and Enabling Technologies
PublikacjaThis guest edition of Cybernetics and Systems is a broadening continuation of our last year edition titled “Intelligence Augmentation and Amplification: Approaches, Tools, and Case Studies”. This time we cover research perspective extending towards what is known as Society 4.0. Bob de Vit brought the concept of Society 4.0 to life in his book “Society 4.0 – resolving eight key issues to build a citizens society”. From the Systems...
-
Global energy transition: From the main determinants to economic challenges regions
PublikacjaDynamic global energy transition has been accelerating for the last decade. Interestingly, the energy transition is multidimensional and concerns both the dimensions of technique/ technology and the economic, social, institu-tional, and legal spheres (Shuguang et al., 2022; Tzeremes et al., 2022; Ram-zan et al., 2022; Tzeremes et al., 2022). The literature also points to the signif-icant impact of the digitization of the global...
-
The investment process in the power supply industry
PublikacjaThe basis for power supply industry programming in a market economy should be the principle of sustainable development, which must take into account maintaining an adequate level of energy security on the one hand, and the aim to preserve the maximum degree of non-renewable resources on the other hand. Therefore, the overriding aim should be a strive to meet the current and prospective demand for energy and fuel, in conjugation...
-
Digital Public Service Innovation: Framework Proposal
PublikacjaThis paper proposes the Digital Public Service Innovation Framework that extends the "standard" provision of digital public services according to the emerging, enhanced, transactional and connected stages underpinning the United Nations Global e-Government Survey, with seven example "innovations" in digital public service delivery -- transparent, participatory, anticipatory, personalized, co-created, context-aware and context-smart....
-
Comparison and Analysis of Service Selection Algorithms
PublikacjaIn Service Oriented Architecture, applications are developed by integration of existing services in order to reduce development cost and time. The approach, however, requires algorithms that select appropriate services out of available, alternative ones. The selection process may consider both optimalization requirements, such as maximalization of performance, and constraint requirements, such minimal security or maximum development...
-
Chromatographic analyses of Lavandula angustifolia and Rosmarinus officinalis extracts and their biological effects in mammalian cells and cell-free systems
PublikacjaKnowledge of biological properties of natural compounds allows to understand their therapeutic value, efficacy and security. We investigated: composition of Lavandula angustifolia (LA) and Rosmarinus officinalis (RO) extracts, their antioxidant capacity, cytotoxicity and genotoxicity, their DNA-protective potential against DNA damage induced in hamster V79 cells by several genotoxins or in plasmid DNA by Fe2+ ions and activity...
-
CURRENT SITUATION ON THE POLAND REAL ESTATE MARKET
PublikacjaIn recent years the polish real estate market has been characterised by a significant increase in supply and demand. This was facilitated by a number of macroeconomic factors. In recent years, housing has been commissioned as 30 years ago. Therefore, the depth analysis issue of the causes and consequences for the Polish economy of these trends is now relevant. Among the reasons are significant economic growth, low interest rates...
-
An Automated Method for Biometric Handwritten Signature Authentication Employing Neural Networks
PublikacjaHandwriting biometrics applications in e-Security and e-Health are addressed in the course of the conducted research. An automated graphomotor analysis method for the dynamic electronic representation of the handwritten signature authentication was researched. The developed algorithms are based on dynamic analysis of electronically handwritten signatures employing neural networks. The signatures were acquired with the use of the...
-
Selection of an artificial pre-training neural network for the classification of inland vessels based on their images
PublikacjaArtificial neural networks (ANN) are the most commonly used algorithms for image classification problems. An image classifier takes an image or video as input and classifies it into one of the possible categories that it was trained to identify. They are applied in various areas such as security, defense, healthcare, biology, forensics, communication, etc. There is no need to create one’s own ANN because there are several pre-trained...
-
Automated Valuation Model based on fuzzy and rough set theory for real estate market with insufficient source data
PublikacjaObjective monitoring of the real estate value is a requirement to maintain balance, increase security and minimize the risk of a crisis in the financial and economic sector of every country. The valuation of real estate is usually considered from two points of view, i.e. individual valuation and mass appraisal. It is commonly believed that Automated Valuation Models (AVM) should be devoted to mass appraisal, which requires a large...
-
Zarządzanie zaufaniem w bezprzewodowych sieciach czujników - studium przypadku
PublikacjaW artykule przedstawiono studium przypadku dotyczące zastosowania bezprzewodowej sieci czujników do wspomagania pacjenta z nadwagą w jego środowisku domowym. Przyjęto, że sieć wykorzystuje metodę rozproszonego zarządzania zaufaniem i pokazano, że metoda ta umożliwia wykrycie i izolację czujników realizujących działania sprzeczne z polityką sieci. Ilościowe oszacowanie czasu niezbędnego do wykrycia takich...
-
SPECYFIKA OBLIGACJI ZAMIENNYCH EMITOWANYCH PRZEZ SPÓŁKI PUBLICZNE
PublikacjaUpublicznienie rynku instrumentów dłużnych przedsiębiorstw w Polsce umożliwiło spółkom bardziej efektywne pozyskiwanie środków finansowych poprzez zaciąganie długu u wierzycieli detalicznych, równolegle z istniejącą już możliwością pozyskiwania kapitałów własnych. Rynek ten otworzył także spółkom publicznym drogę do emisji obligacji zamiennych, które z kolei bez obecności instrumentów udziałowych emitenta na rynku publicznym, stają...
-
Tracking of the broadband source of the underwater noise in the very shallow water conditions
PublikacjaThe paper contains the result s, both theoretical and experimental , connected with the tracking of the underwater noise source as small ships, pontoon , diver and so on. The pro blem of security in the shallow water area is the challenge for underwater acousticians. In this paper there is take n into account the detection of the sources that move on the surface of the sea or underwater in shallow...
-
Damage Detection Strategies in Structural Health Monitoring of Overhead Power Transmission System
PublikacjaOverhead power transmission lines, their supporting towers, insulators and other elements create a highly distributed system that is vulnerable to damage. Typical damage scenarios cover cracking of foundation, breakage of insulators, loosening of rivets, as well as cracking and breakage of lines. Such scenarios may result from various factors: groundings, lightning strikes, floods, earthquakes, aeolian vibrations, conductors galloping,...
-
BeesyBees: A mobile agent-based middleware for a reliable and secure execution of service-based workflow applications in BeesyCluster
PublikacjaIntegrating distributed services into workflows comes with its own set of challenges, including security, coordination, fault tolerance and optimisation of execution time. This paper presents an architecture and implementation - nicknamed BeesyBees - that allows distributed execution of workflow applications in BeesyCluster using agents. BeesyCluster is a middleware that allows users to access distributed resources as well as publish...
-
Privacy-Preserving, Scalable Blockchain-Based Solution for Monitoring Industrial Infrastructure in the Near Real-Time
PublikacjaThis paper proposes an improved monitoring and measuring system dedicated to industrial infrastructure. Our model achieves security of data by incorporating cryptographical methods and near real-time access by the use of virtual tree structure over records. The currently available blockchain networks are not very well adapted to tasks related to the continuous monitoring of the parameters of industrial installations. In the database...
-
Comparison of AHP and Numerical Taxonomy Methods Based on Biogas Plant Location Analysis
PublikacjaThe paper presents a comparison of the multi-criteria Analytic Hierarchy Process (AHP) method and numerical taxonomy in biogas plant location selection. Biogas plants are sources that will significantly contribute to the implementation of the provisions of the energy and climate package for Poland by 2030. Increasing the share of energy produced from renewable sources, e.g. biogas plants, will increase the country’s energy security....
-
Student Perspectives on the 2017 ESA Concurrent Engineering Challenge
PublikacjaIn September 2017, the first ESA Academy’s Concurrent Engineering Challenge (CEC) was held, giving 88 Master’s and PhD-level students from twelve ESA Member and Associate States a powerful platform to experience system engineering in an intense, fast paced, and real-world environment. Within four days, teams of physics and engineering students in Concurrent Design Facilities (CDF) located in Politecnico di Torino, Universidad Polit´ecnica...
-
Digital Innovations and Smart Solutions for Society And Economy: Pros and Cons
PublikacjaRecent developments in artificial intelligence (AI) may involve significant potential threats to personal data privacy, national security, and social and economic stability. AI-based solutions are often promoted as “intelligent” or “smart” because they are autonomous in optimizing various processes. Be-cause they can modify their behavior without human supervision by analyzing data from the environ-ment, AI-based systems may be...
-
Using the Fingerprinting Method to Customize RTLS Based on the AoA Ranging Technique
PublikacjaReal-time Locating Systems (RTLSs) have the ability to precisely locate the position of things and people in real time. They are needed for security and emergency applications, but also for healthcare and home care appliances. The research aims for developing an analytical method to customize RTLSs, in order to improve localization performance in terms of precision. The proposed method is based on Angle of Arrival (AoA), a ranging...
-
Oxygen vacancy-enriched V2O5·nH2O nanofibers ink for universal substrates-tolerant and multi means-integratable NH3 sensing
PublikacjaUniversal substrates-tolerant and multi means-integratable ammonia (NH3) sensing is highly desired in future Internet of Things in environmental monitoring, food security and early diagnosis of human diseases, however, is still less than satisfactory. Here, an oxygen vacancy-governed NH3 sensing has been developed with V2O5·nH2O nanofibers (NFs) ink, via combined thermal decomposition of ammonium metavanadate and dilution. As-obtained...
-
Testy platformy SAN dla sektora elektroenergetycznego
PublikacjaWspółczesna infrastruktura elektroenergetyczna jest narażona na zagrożenia związane z dużą liczbą nowych luk i słabo- ści architektonicznych wynikających z szerszego wykorzystania technologii informacyjnych i komunikacyjnych (ang. Information and Communication Technologies – ICT). Połączenie infrastruktury elektroenergetycznej z Internetem naraża ją na nowe rodzaje ataków, takie jak ataki typu APT (ang. Advanced Persistent Threats)...
-
Overview of Metamaterials-Integrated Antennas for Beam Manipulation Applications: The Two Decades of Progress
PublikacjaMetamaterials (MMs) are synthetic composite structures with superior properties not found in naturally occurring materials. MMs have gained massive attention over the last two decades because of their extraordinary properties, such as negative permittivity and permeability. These materials enable many applications in communication subsystems, especially in the field of antenna design, to enhance gain, bandwidth, and efficiency,...
-
Preferred Benchmarking Criteria for Systematic Taxonomy of Embedded Platforms (STEP) in Human System Interaction Systems
PublikacjaThe rate of progress in the field of Artificial Intelligence (AI) and Machine Learning (ML) has significantly increased over the past ten years and continues to accelerate. Since then, AI has made the leap from research case studies to real production ready applications. The significance of this growth cannot be undermined as it catalyzed the very nature of computing. Conventional platforms struggle to achieve greater performance...
-
Urban city lights. Light pollution as one of the effects of incorrectly designed external illumination. How can a successful lighting masterplan diminish its impact?
PublikacjaIn the modern world, artificial lighting brings many tangible benefits such as the ability to extend working hours and so increase production, recreational use of the city after dark, or the possibility to travel regardless of the time of day. However, this flexibility comes at a price and negatively impacts on the environment. One such negative phenomenon is Light Pollution ‐ a term used to describe excessive nighttime artificial...
-
Development of the System Assurance Reference Model for Generating Modular Assurance Cases
PublikacjaAssurance cases are structured arguments used to demonstrate specific system properties such as safety or security. They are used in many industrial sectors including automotive, aviation and medical devices. Larger assurance cases are usually divided into modules to manage the complexity and distribute the work. Each of the modules is developed to address specific goals allocated to the specific objects i.e. components of the...
-
Zarządzanie wiedzą w małych przedsiębiorstwach oferujących wiedzochłonne usługi biznesowe
PublikacjaCelem artykułu jest przedstawienie praktyk zarządzania wiedzą oraz czynników wpływających na sukces, bądź porażkę w ich wdrażaniu na podstawie badania jakościowego przeprowadzonego w trzech firmach działających na terenie województwa pomorskiego. Firmy te należą do sektora małych i średnich przedsiębiorstw oraz oferują wiedzochłonne usługi biznesowe (knowledge-intensive business services – KIBS). W artykule podjęto próbę odpowiedzi...
-
Koncepcja analizy stanów emocjonalnych użytkowników w kontekście systemów zabezpieczeń transportowych
PublikacjaAutorzy, przywołując własne i światowe badania nad rozpoznawaniem emocji ludzkich z obrazu twarzy, wskazują na możliwość zastosowania algorytmów komputerowych i ich implementacji w komputerach osobistych (i innych urządzeniach personalnych wyposażonych w dostatecznie silny procesor obliczeniowy). Zastosowanie takiego rozwiązania może poprawić bezpieczeństwo użytkowania urządzeń, maszyn i pojazdów, których operatorzy muszą gwarantować...
-
Wyzwania metodyczne w procesie zarządzania bezpieczeństwem elektrowni jądrowych
PublikacjaW pracy przedstawiono aktualne zagadnienia i wyzwania metodyczne dotyczące zarządzania bezpieczeństwem elektrowni jądrowych. Nawiązuje się m.in. do publikacji Międzynarodowej Agencji Energii Atomowej z siedzibą w Wiedniu w sprawie zintegrowanego podejścia do zarządzaniu bezpieczeństwem (safety) i ochroną (security). Podkreśla się znaczenie projektowania niezależnych barier w systemie zabezpieczeń i zwiększania roli pasywnych układów...
-
Extraction of stable foreground image regions for unattended luggage detection
PublikacjaA novel approach to detection of stationary objects in the video stream is presented. Stationary objects are these separated from the static background, but remaining motionless for a prolonged time. Extraction of stationary objects from images is useful in automatic detection of unattended luggage. The proposed algorithm is based on detection of image regions containing foreground image pixels having stable values in time and...
-
Analysis of electricity generation variability in 2019 with special consideration of electrical energy generation from wind sources.
PublikacjaThis article presents issues related to the broadly understood development of wind energy. The state of the art of wind energy in the world has been discussed. This paper also shows issues related to factors affecting the development of renewable energy sources and their impact on the natural environment on the basis of available research. The focus is, however, on the critical analysis of phenomena in the data of the Transmission...
-
Customization of UWB 3D-RTLS Based on the New Uncertainty Model of the AoA Ranging Technique
PublikacjaThe increased potential and effectiveness of Real-time Locating Systems (RTLSs) substantially influence their application spectrum. They are widely used, inter alia, in the industrial sector, healthcare, home care, and in logistic and security applications. The research aims to develop an analytical method to customize UWB-based RTLS, in order to improve their localization performance in terms of accuracy and precision. The analytical...
-
Hybrid no-signaling-quantum correlations
PublikacjaFundamental investigations in non-locality have shown that while the no-signaling principle alone is not sufficient to single out the set of quantum non-local correlations, local quantum mechanics and no-signaling together exactly reproduce the set of quantum correlations in the two-party Bell scenario. Here, we introduce and study an intermediate hybrid no-signaling quantum set of non-local correlations that we term HNSQ in the...
-
Innovative method of localization airplanes in VCS (VCS-MLAT) distributed system
PublikacjaThe article presents the concept and the structure of the localization module. The prototype module is the part of the VCS (VCS-MLAT) localization distributed system. The device receives the audio signal transmitted in airplanes band (118 MHz – 136 MHz). Received data with the timestamps are send to the main server. The data from multiple devices estimates the localization of the airplane. The main aim of the project is the analysis...
-
Narracje o świeżej traumie. Upamiętnianie ataków terrorystycznych w krajobrazie codziennym miast
PublikacjaRecent trauma Narratives: commemorating terrorist attacks in Everyday cityscape Contemporary city incidentally becomes a non-accidental target of acts violating the primary sense of security and safety. The fundamental assumptions about so- cial and interpersonal interactions that guarantee social life are severely disturbed. These events, primarily the ones related to terrorist attacks, leave in social memo- ry traces associated...
-
Possibilities for Developing Electromobility by Using Autonomously Powered Trolleybuses Based on the Example of Gdynia
PublikacjaTrolleybus transport refers to contemporary challenges related to a reduction in emissions of greenhouse gases and CO2 into the atmosphere formulated by international institutions, such as the United Nations, the Organisation for Security and Co-operation in Europe, or the European Union. Departure from fossil fuels in urban transport is one of the key challenges for the coming years. Trolleybuses are an important tool in this...
-
Metoda TrustCritic oceny wiarygodności sklepów internetowych
PublikacjaW artykule przedstawiono metodę oceny wiarygodności sklepów internetowych TrustCritic. Powszechnie występujące nadużycia w handlu elektronicznym sprawiają, że zaufanie do przedsiębiorcy staje się kluczowym czynnikiem decyzji konsumentów. Przedsiębiorca narażony jest na niezgodność z prawem, utratę wizerunku i klientów. Artykuł omawia problematykę nadużyć w sferze e-biznesu oraz proponuje wielokryterialny model oceny sklepu internetowego,...