Wyniki wyszukiwania dla: THREATS
-
Wireless Systems of Threats Monitoring
PublikacjaThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...
-
Wireless systems of threats monitoring
PublikacjaThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Wireless systems of threats monitoring
PublikacjaThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Wireless Systems of Threats Monitoring
PublikacjaConcept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Wireless systems of threats monitoring
Publikacja -
Wireless Systems of Threats Monitoring
Publikacja -
Wireless systems of threats monitoring
Publikacja -
Wireless systems of threats monitoring
Publikacja -
Digital Threats: Research and Practice
Czasopisma -
Mobile Security: Threats and Best Practices
PublikacjaCommunicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...
-
Malware - a survey on threats and mitigation techniques
PublikacjaThis paper presents up-to-date knowledge related to malware – malicious software. Firstly the definitions are presented and discussed briefly. Next, the paper presents a bit of motivation along with the malware fighting objectives. Malware poses an emerging threat in accordance to smart grids in general and advanced metering infrastructure in particular. The discussion is then directed towards known taxonomy along with a new proposal...
-
ChatGPT - opportunities or threats in the educational process
Publikacja -
Threats to Rural Landscape and Its Protection in Poland
PublikacjaThe article describes the premises and conditions for the implementation of a pro-landscape spatial policy in rural areas in Poland. It presents the erosion of spatial order in a large part of the country’s territory. Firstly, the state of protection of the rural landscape and the legal aspects of shaping the space of rural areas are described. Secondly, the location is depicted, and the main physiognomic and environmental threats...
-
LIGHT POLLUTION IN THE CONTEXT OF THREATS TO THE WILDLIFE CORRIDORS
PublikacjaAccess to remote sensing night-time imagery allows for modeling of light pollution Increasingly, data on the propagation of artificial light are a source of interesting information for different fields of science and affect the planning of economic development. The article presents the problem of light pollution in the context of threats to the wildlife corridors in Poland. Wildlife corridors are areas that allow safe migration...
-
Investigation of Noise Threats and Their Impact on Hearing in Selected Schools
PublikacjaNoise measurements conducted in selected schools in Gdansk area are presented in this paper. The main aim of this research was to determine noise threats at schools. Some objective measurements of the acoustic climate were performed employing a noise monitoring station engineered at the Multimedia System Department, Gdansk University of Technology. Simultaneously, subjective noise annoyance examinations were carried out among pupils...
-
Early detection of imminent threats in social relation graphs
PublikacjaWczesne wykrywanie zagrożeń i anomalii w sieciach społecznych jest dziś prawdziwym wyzwaniem. Ludzie w realnym świecie tworzą wiele złożonych relacji społecznych, które mogą być przedstawione za pomocą grafów, w których węzły reprezentują aktorów (pojedyncze osoby lub organizacje) a krawędzie wskazują na powiązania pomiędzy nimi. Analiza nieustannie zmieniających się relacji pomiędzy aktorami może wskazać konkretne nadciągające...
-
A video monitoring system using ontology-driven identification of threats
PublikacjaIn this paper, we present a video monitoring systemthat leverages image recognition and ontological reasoningabout threats. In the solution, an image processing subsystemuses video recording of a monitored area and recognizesknown concepts in scenes. Then, a reasoning subsystem uses anontological description of security conditions and informationfrom image recognition to check if a violation of a conditionhas occurred. If a threat...
-
Carsharing - Opportunities and Threats for Cities: Proposals of Solutions for Urban Policy
PublikacjaThe carsharing of a current generation is a short-term car renting service with a capability to find in the nearest surrounding a fleet car parked anywhere in the public space where the previous user left it, as well as to book, open, rent and pay of, with the use of a dedicated mobile application. Nowadays, only a minority of municipalities is considering implementing the carsharing in their policies. The lack of awareness of...
-
WP1 of INDECT Project: Intelligent Monitoring and Automatic Detection of Threats
Publikacja -
WP1: Intelligent Monitoring and Automatic Detection of Threats - partners cooperation
Publikacja -
WP1: Intelligent monitoring and automatic detection of threats -introduction to the WP1
Publikacja -
Teaching Architecture – contemporary challenges and threats in the complexity of built environment
PublikacjaThe complexity of the modern built environment is a problem n ot only of architectural and urban issues. This issue extends to many othe r disciplines as well as covering a wide range of social engagements. The idea of writing this pa per is generally initiated by the debate which took place in Gdańs k on 22.01.2016, and was prepar ed in order to meet representatives of the four circles of interest...
-
Imminent threats analysis and security level evaluation in social networks
PublikacjaRozprawa doktorska poświęcona jest analizie nadciągających zagrożeń w sieciach społecznych. Dotyczy to takich zjawisk jak spam, phishing, kradzież tożsamości czy ataki na systemy reputacji w serwisach aukcji internetowych. W pracy zaproponowano metodę pozwalającą na wczesne wykrycie zagrożeń w sieciach społecznych w oparciu o zdefiniowane modele zachowań aktorów sieci. Modele zachowań tworzone są za pomocą podgrafów wzorcowych...
-
Ad hoc routing protocols - security objectives, threats and solution
PublikacjaZaprezentowano przykładowe strategie routingu stosowane w bezprzewodowych sieciach ad-hoc z transmisją wieloetapową. Dokonanao przegladu protokołow routingu, zidentyfikowano podstawowe typy ataków i zagrożenia integralności i poufności transmisji w sieciach bezprzewodowych. Przedstawiono przykładowe rozwiazania algorytmów routingu.
-
Investigation of noise threats and their impact on hearing in selected schools - a pilot study.
PublikacjaNoise measurements conducted in selected schools in Gdansk area are presented in this paper. The main aim of this research was to determine noise threats at schools. Some objective measurements of the acoustic climate were performed employing a noise monitoring station engineered at the Multimedia System Department, Gdansk University of Technology. Simultaneously, subjective noise annoyance examinations were carried out among pupils...
-
Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs
PublikacjaIn ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...
-
Threats to Armenia’s Security in the National Strategy and Practice with Special Emphasis on External Security,
PublikacjaThe national security strategy adopted in 2007 provided a detailed definition of security and identified its threats. The key threat to the Armenian state was considered to be the Nagorno-Karabakh conflict. The document indicated the Collective Security Treaty Organisation main guarantor of security, with Russia being Armenia’s main partner in bilateral relations. The second position in the strategy was assigned to cooperation...
-
Operational analysis of threats to the security of NATO’s eastern flank. Context of hybrid activities
Publikacja -
Transport of dangerous goods by rail, and threats to the subsoil of the railway surface in the event of a disaster
PublikacjaIn Poland, in 2020, the mass of dangerous goods (loads) transported by rail was 26 151.06 thousand tone. This translated into the performance of 8 899 691.89 thousand tone - km of transport performance. In 2020, these figures accounted for 11.72% of the weight of goods transported by rail. The situation is similar in other countries around the world. With such a large volume of transport of dangerous...
-
AEGIS – Mobile Device for Generating Electromagnetic Curtain for Special Applications and Countering the Threats of RCIED
PublikacjaIn the article the assumptions, design and realization of the technological demonstrator of a mobile device for generating an electromagnetic curtain (with a cryptonym AEGIS) were presented, both in the area of hardware and software. The device is designed to block the radio communication systems by which it is possible to detonate the Radio Controlled Improvised Explosive Devices (RCIEDs). The preliminary laboratory tests of the...
-
Monitoring of Selected CBRN Threats in the Air in Industrial Areas with the Use of Unmanned Aerial Vehicles
Publikacja -
Vaccination Against Measles, Mumps, and Rubella in the Light of Current Epidemic Threats: Unjustified Postponement
Publikacja -
Innovative consciousness and threats estimation connected with implementation of innovations to SMEs cooperating with shipbuilding industry
PublikacjaPodejmowanie działań innowacyjnych przez małe i średnie przedsiębiorstwa nie jest szeroko rozpowszechnione. Wynika to, między innymi, ze specyfiki tego sektora. MSP często dysponują ograniczonymi środkami finansowymi i nisko wykwalifikowanymi pracownikami, co stanowi w wielu przypadkach barierę we wprowadzaniu innowacji. Nie mniej istotne są inne podmioty działające w otoczeniu MSP włączające się w realizacje procesu innowacyjnego....
-
THE IMPLICATIONS OF ECONOMIC DEVELOPMENT, CLIMATE CHANGE AND EUROPEAN WATER POLICY ON SURFACE WATER QUALITY THREATS
Publikacja -
Zagrożenia środowiska podczas eksploatacji gazociągów podmorskich = Environmental threats during oparation of subsea gas pipelines
PublikacjaPrzedstawiono wybrane zagadnienia eksploatacji gazociągów podmorskich, w tym zagrożenia dla rekreacyjnego i gospodarczego korzystania z morza. Uszkodzenie gazociągu podmorskiego jest zazwyczaj spowodowane korozją, działaniami morskimi lub zagrożeniami naturalnymi. W określonych warunkach mogą wytrącić się kryształy hydratów węglowodorów gazowych, co może prowadzić do zablokowania linii przesyłowej
-
Occurrence of Trichocolea tomentella (Ehrh.) Dumort. (Marchantiophyta, Trichocoleaceae) in the Polish Carpathians: distribution, habitat preferences, current threats, and recommendations
Publikacja -
Adaptive system for recognition of sounds indicating threats to security of people and property employing parallel processing of audio data streams
PublikacjaA system for recognition of threatening acoustic events employing parallel processing on a supercomputing cluster is featured. The methods for detection, parameterization and classication of acoustic events are introduced. The recognition engine is based onthreshold-based detection with adaptive threshold and Support Vector Machine classifcation. Spectral, temporal and mel-frequency descriptors are used as signal features. The...
-
GeoSPAR Project. Validation and selection methods of geoinformation analysis using GIS for ranking and forecasting of terrorist threats and criminal events
PublikacjaThe paper presents the description of work activities which have already been done within the first two stages – WorkPackage 1 and WorkPackage 2 - of the GeoSPAR Project. In such a context the general conceptual design of the GIS system and associate web service was presented and analysed. In addition, the operational and technical requirements for the GeoSPAR system have been specified and discussed; with special emphasis on system...
-
Civilization Threats and Sustainable Development
Kursy Online -
Civilization Threats and Sustainable Development -2022/23
Kursy Online -
Civilization Threats and Sustainable Development 23/24
Kursy Online -
Algorithms for processing and visualization of Critical Infrastructure security data as well as simulation and analysis of threats = Algorytmy przetwarzania i wizualizacji danych dotyczących bezpieczeństwa infrastruktur krytycznych oraz symulacji i analizy zagrożeń
PublikacjaRozprawa traktuje o algorytmach przetwarzania danych dotyczących różnego rodzaju zagrożeń, w szczególności wyników analiz ryzyka infrastruktur krytycznych, pozwalających na przestrzenną analizę tych danych w kontekście geograficznym za pomocą dedykowanego Systemu Informacji Przestrzennej. Prezentowane metody analizy zgrupowań Infrastruktur Krytycznych oraz propagacji ich zagrożeń wykorzystują wyniki syntetycznej analizy podatności...
-
LIDAR data from a cliff measurement conducted in the vicinity of the town of Jastrzębia Góra on the Baltic Sea coast
Dane BadawczeMeasurement data were obtained during research related to the use of LiDAR observations to assess the stability of a coastal cliff. The collected information comes from measurements conducted in the vicinity of the town of Jastrzębia Góra on the Baltic Sea coast. The acquired point cloud constitutes a comprehensive set of data regarding the geometry...
-
Piotr Szczuko dr hab. inż.
OsobyDr hab. inż. Piotr Szczuko w 2002 roku ukończył studia na Wydziale Elektroniki, Telekomunikacji i Informatyki Politechniki Gdańskiej zdobywając tytuł magistra inżyniera. Tematem pracy dyplomowej było badanie zjawisk jednoczesnej percepcji obrazu cyfrowego i dźwięku dookólnego. W roku 2008 obronił rozprawę doktorską zatytułowaną "Zastosowanie reguł rozmytych w komputerowej animacji postaci", za którą otrzymał nagrodę Prezesa Rady...
-
Anna Danuta Dettlaff dr inż.
OsobyTytuł magistra inżyniera uzyskała z wyróżnieniem w 2013 roku w Wydziale Chemii Analitycznej. W latach 2013-2017 była doktorantką na kierunku Technologia Chemiczna, podczas których zajmowała się pracą pt. "Badania nad nanokompozytami bazującymi na polimerach przewodzących oraz materiałach węglowych w celu zastosowania ich w superkondensatorach". W 2015 roku odbyła trzymiesięczny staż naukowy w Oldenburgu w Niemczech. Stopień doktora...
-
A city and a wind farm. Landscape perspective
PublikacjaThe aim of the paper is to present the problems of the location of the wind farms in close neighbourhood to the historical cities, and the ways to minimize the potential landscape threats. The production of clean energy is obligatory in EU. In spite of how positive to the environment the wind energy production is, it may cause negative effects. The results of landscape studies of two towns in Poland prove that the location of such...
-
Janusz Górski prof. dr hab. inż.
Osoby -
The green waterfront of a city. Where are the limits of good planning? Gdansk case
PublikacjaThe aim of the article is to present the role of green public areas of waterfronts in shaping the image of cities, and the threats to such landscape which may be caused by wrong planning decisions. The case study of Gdansk sea-shore area in Poland is presented as an example to illustrate the values and potential of the waterfront landscape which can be easily destroyed by inadequate spatial development. Some theoretical studies...
-
Jakub Miler dr inż.
OsobyKariera akademicka: 2000: mgr inż. Wydział ETI, Politechnika Gdańska, praca pt. "Computer system for supporting risk management in a software engineering project", promotor prof. Janusz Górski 2005: dr inż. Wydział ETI, Politechnika Gdańska, rozprawa pt. "A Method of Software Project Risk Identification and Analysis", obroniona z wyróżnieniem, dziedzina nauki techniczne, dyscyplina informatyka, promotor prof. Janusz Górski Zainteresowania...
-
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics
PublikacjaThe contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...