Filtry
wszystkich: 30210
-
Katalog
- Publikacje 6062 wyników po odfiltrowaniu
- Czasopisma 715 wyników po odfiltrowaniu
- Konferencje 173 wyników po odfiltrowaniu
- Wydawnictwa 3 wyników po odfiltrowaniu
- Osoby 250 wyników po odfiltrowaniu
- Wynalazki 1 wyników po odfiltrowaniu
- Projekty 25 wyników po odfiltrowaniu
- Laboratoria 1 wyników po odfiltrowaniu
- Kursy Online 191 wyników po odfiltrowaniu
- Wydarzenia 25 wyników po odfiltrowaniu
- Dane Badawcze 22764 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: CRYPTOGRAPHY, MEDICAL DATA, QUATERNION ROTATION, LOSSLESS SCHEME, SECURITY, DICOM, JULIA SETS.
-
Piotr Szczuko dr hab. inż.
OsobyDr hab. inż. Piotr Szczuko w 2002 roku ukończył studia na Wydziale Elektroniki, Telekomunikacji i Informatyki Politechniki Gdańskiej zdobywając tytuł magistra inżyniera. Tematem pracy dyplomowej było badanie zjawisk jednoczesnej percepcji obrazu cyfrowego i dźwięku dookólnego. W roku 2008 obronił rozprawę doktorską zatytułowaną "Zastosowanie reguł rozmytych w komputerowej animacji postaci", za którą otrzymał nagrodę Prezesa Rady...
-
An integrated framework for security protocol analysis
PublikacjaAssurance of security protocols needs particular attention. Flaws in a protocol can devastate security of the applications that rely on it. Analysis of the protocols is difficult and it is recommended that formal methods are employed to provide for higher levels of assurance. However, the formal methods can cover only a part of the scope of the problem. It is important that the formal models are valid representations of the protocol...
-
Security and Defence Quarterly
Czasopisma -
Security and Anonymity in Agent Systems
PublikacjaMany agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...
-
Mobile Security: Threats and Best Practices
PublikacjaCommunicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...
-
An Approach to Data Reduction for Learning from Big Datasets: Integrating Stacking, Rotation, and Agent Population Learning Techniques
Publikacja -
A Set of Experience-Based Smart Synergy Security Mechanism in Internet of Vehicles
PublikacjaIn this article, we introduce a novel security mechanism, the Smart Synergy Security (3S). The mechanism uses the Set of Experience Knowledge Structure (SOEKS) and the synergy of security methods in different domains to provide the global optimal security strategy. The proposed strategy is taking into account the characteristics of information security (i.e. confidentiality, integrity, availability, controllability, and reviewability)...
-
Improving medical experts’ efficiency of misinformation detection: an exploratory study
PublikacjaFighting medical disinformation in the era of the pandemic is an increasingly important problem. Today, automatic systems for assessing the credibility of medical information do not offer sufficient precision, so human supervision and the involvement of medical expert annotators are required. Our work aims to optimize the utilization of medical experts’ time. We also equip them with tools for semi-automatic initial verification...
-
A Microwave Sensor with Operating Band Selection to Detect Rotation and Proximity in the Rapid Prototyping Industry
PublikacjaThis paper presents a novel sensor for detecting and measuring angular rotation and proximity, intended for rapid prototyping machines. The sensor is based on a complementary split-ring resonator (CSRR) driven by a conductor-backed coplanar waveguide. The sensor has a planar topology, which makes it simple and cost-effective to produce and accurate in measuring both physical quantities. The sensor has two components, a rotor, and...
-
Security aspects in functional safety analysis
PublikacjaA security level of distributed control and protection system may have a significant impact on the results of functional safety analysis. However, the issue of integrating the safety and security aspects is difficult and usually is neglected during the functional safety analysis. This article presents a method of functional safety analysis which takes into consideration a concept of integrating these two aspects. It is based on...
-
An Algorithm for Listing All Minimal 2-Dominating Sets of a Tree
PublikacjaWe provide an algorithm for listing all minimal 2-dominating sets of a tree of order n in time O(1.3248n) . This implies that every tree has at most 1.3248 n minimal 2-dominating sets. We also show that this bound is tigh.
-
Resilience and Security in Software Defined Networking
PublikacjaThis paper gives an overview of the most important issues on resilience and security in Software Defined Networking
-
An algorithm for listing all minimal double dominating sets of a tree
PublikacjaWe provide an algorithm for listing all minimal double dominating sets of a tree of order $n$ in time $\mathcal{O}(1.3248^n)$. This implies that every tree has at most $1.3248^n$ minimal double dominating sets. We also show that this bound is tight.
-
Evolutionary Sets of Safe Ship Trajectories: Evaluation of Individuals
PublikacjaThe paper presents a description of the evaluation phase of the Evolutionary Sets of Safe Ship Trajectories method. In general, the Evolutionary Sets of Safe Ship Trajectories method combines some of the assumptions of game theory with evolutionary programming and finds an optimal set of cooperating trajectories of all ships involved in an encounter situation. While developing a new version of this method, the authors decided to...
-
A general isogeometric finite element formulation for rotation‐free shells with in‐plane bending of embedded fibers
PublikacjaThis article presents a general, nonlinear isogeometric finite element formulation for rotation-free shells with embedded fibers that captures anisotropy in stretching, shearing, twisting, and bending - both in-plane and out-of-plane. These capabilities allow for the simulation of large sheets of heterogeneous and fibrous materials either with or without matrix, such as textiles, composites, and pantographic structures. The work...
-
Energy Security of Polish Consumers in 2004-2021
PublikacjaTheoretical background: Energy security is one of the most important components of economic security. It is influenced not only by access to energy sources and the economic situation of the state and the individual consumer. The authors adopted the definition of energy security of an individual consumer as included in the UN report. It states that energy security of an individual consumer is guaranteed when the average consumer...
-
Evolutionary Sets of Safe Ship Trajectories: Evaluation of Individuals
PublikacjaThe paper presents a description of the evaluation phase of the Evolutionary Sets of Safe Ship Trajectories method. In general, the Evolutionary Sets of Safe Ship Trajectories method combines some of the assumptions of game theory with evolutionary programming and finds an optimal set of cooperating trajectories of all ships involved in an encounter situation. While developing a new version of this method, the au-thors decided...
-
A Mammography Data Management Application for Federated Learning
PublikacjaThis study aimed to develop and assess an application designed to enhance the management of a local client database consisting of mammographic images with a focus on ensuring that images are suitably and uniformly prepared for federated learning applications. The application supports a comprehensive approach, starting with a versatile image-loading function that supports DICOM files from various medical imaging devices and settings....
-
The Sense of Security of the Prison Service Offi cers
Publikacja -
Dynamika molekularna oddziaływań przeciwgrzybowych heptaenów aromatycznych i ich izomerów all-trans ze sterolami w błonach lipidowych
PublikacjaAromatyczne heptaeny (AH) należą do grupy makrolidów polienowych o działaniu przeciwgrzybowym. Antybiotyki z tej grupy były pierwszymi, które zostały wykorzystane w terapii układowych infekcji grzybiczych. Amfoterycyna B (AmB) oraz nystatyna, czyli niearomatyczni przedstawiciele makrolidów heptaenowych, mają istotne znaczenie kliniczne w leczeniu, odpowiednio, grzybic wewnętrznych i zewnętrznych. Molekularne podstawy mechanizmu...
-
Integrated functional safety and cyber security analysis
PublikacjaThe chapter is devoted some important issues of the functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with regard of the evaluation assurance levels (EAL)...
-
Client-side versus server-side geographic data processing performance comparison: Data and code
PublikacjaThe data and code presented in this article are related to the research article entitled “Analysis of Server-side and Client-side Web-GIS data processing methods on the example of JTS and JSTS using open data from OSM and Geoportal” (Kulawiak et al., 2019). The provided 12 datasets include multi-point and multi-polygon data of different scales and volumes, representing real-world geographic features. The datasets cover the area...
-
Software Agents for Computer Network Security
PublikacjaThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
Generalized Dold sequences on partially-ordered sets
PublikacjaDold sequences constitute an important class of integer sequences that play an important role in combinatorics, number theory, topology and dynamical systems. We generalize the notion of Dold sequence for the case of partially ordered sets and describe their properties. In particular we give two alternative descriptions of generalized Dold sequences: by some class of elementary sequences as well as by different...
-
Standards on Cyber Security Assessment of Smart Grid
PublikacjaSecurity evaluation of communication systems in smart grid poses a great challenge to the developers and operators. In recent years many new smart grid standards were proposed, which paradoxically results in the difficulty in finding a relevant publication in this plethora of literature. This paper presents the results of a systematic analysis which aimed at addressing this issue by identifying standards that present sound security...
-
Multichannel self-optimizing active noise control scheme
PublikacjaThe problem of cancellation of a nonstationary sinusoidal interference, acting at the output of an unknown multivariable linear stable plant, is considered. The proposed cancellation scheme is a nontrivial extension of the SONIC (self-optimizing narrowband interference canceller) algorithm, developed earlier for single-input, single-output plants. In the important benchmark case - for disturbances with randomwalk-type amplitude...
-
Security ontology construction and integration
PublikacjaThere are many different levels on which we can examine security. Each one is different from others, all of them are dependent on the context. Hence the need to bear additional knowledge enabling efficient utilization of the knowledge by the computers. Such information can be provided by ontologies. The paper presentsgathered requirements needed to be taken into account when creating an ontology. The method of ontology creation...
-
Analysis of Vibration and Acoustic Signals for Noncontact Measurement of Engine Rotation Speed
PublikacjaThe non-contact measurement of engine speed can be realized by analyzing engine vibration frequency. However, the vibration signal is distorted by harmonics and noise in the measurement. This paper presents a novel method for the measurement of engine rotation speed by using the cross-correlation of vibration and acoustic signals. This method can enhance the same frequency components in engine vibration and acoustic signal. After...
-
The design of an intelligent medical space supporting automated patient interviewing
PublikacjaThe article presents the architecture and results of implementing an application for the intelligent medical space UbiDoDo (Ubiquitous Domestic Doctor's Office). The main purpose of the application is real-time monitoring of the biomedical parameters of a patient in his domestic environment. It allows an immediate reaction to appearing symptoms and provides means to automatically interview the patient and deliver his results to...
-
Influence of Fluid Compressibility and Movements of the Swash Plate Axis of Rotation on the Volumetric Efficiency of Axial Piston Pumps
PublikacjaThis paper describes the design of a swash plate axial piston pump and the theoretical models describing the bulk modulus of aerated and non-aerated fluids. The dead space volume is defined and the influence of this volume and the fluid compressibility on the volumetric efficiency of the pump is considered. A displacement of the swash plate rotation axis is proposed to reduce the dead space volume for small swash plate swing angles....
-
Determining and verifying the safety integrity level with security aspects
PublikacjaSafety and security aspects consist of two different group of functional requirements for the control and protection systems. It is the reason why the analyses of safety and security shouldnt be integrated directly. The paper proposes extension of the currently used methods of functional safety analyses. It can be done with inclusion of the level of information security assigned to the technical system. The article addresses some...
-
Software modules and application layer's security structure of RSMAD
PublikacjaThe paper discusses the software modules of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The structure of the application layer of the system has also been analysed in details, including: purpose, structure and principles of operation of software modules constituting this system. In addition, the paper presents and discusses the structure of security of application layer...
-
The Energy of Finance in Refining of Medical Surge Capacity
PublikacjaThe availability of resources and their concentration in the place of greatest need, will not allow us to successfully overcome a medical surge without the energy required to activate these resources and activities, and increase their quantities if necessary, that is why the staff and management of healthcare institutions are forced to making ethical crisis decisions about who wins and who loses. This study highlights the versatility...
-
Neutrosophic Sets and Systems
Czasopisma -
Logical Interface for Soft Handover – an effective scheme of handovers in Proxy Mobile IPv6
PublikacjaMultimedia services are currently commonly available on mobile devices. Due to networks' convergence and migration to all-IP networks, mobility management at network layer is required. Moreover, nowadays it is popular to equip mobile devices with more than one wireless interface. Thus, soft handovers can be implemented, which means that an existing connection is removed after a new one is established. Usage of the Logical Interfaces...
-
Adapting Agile Practices to Security Context – Practitioners’ Perspective
PublikacjaIn this paper we explore the problem of introducing agile practices to projects dealing with systems with high security requirements. We also propose an approach based on AgileSafe method and OWASP ASVS guidelines, that could support such introduction. What is more, we present the results of two surveys aimed at analyzing IT practitioners’ views on applying agile methods to security reliant systems as well as evaluating the set...
-
Security Information Sharing for the Polish Power System
PublikacjaThe Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...
-
Is Artificial Intelligence Ready to Assess an Enterprise’s Financial Security?
PublikacjaThis study contributes to the literature on financial security by highlighting the relevance of the perceptions and resulting professional judgment of stakeholders. Assessing a company’s financial security using only economic indicators—as suggested in the existing literature—would be inaccurate when undertaking a comprehensive study of financial security. Specifically, indices and indicators based on financial or managerial reporting...
-
Machine Learning and Electronic Noses for Medical Diagnostics
PublikacjaThe need for noninvasive, easy-to-use, and inexpensive methods for point-of-care diagnostics of a variety of ailments motivates researchers to develop methods for analyzing complex biological samples, in particular human breath, that could aid in screening and early diagnosis. There are hopes that electronic noses, that is, devices based on arrays of semiselective or nonselective chemical sensors, can fill this niche. Electronic...
-
Optimizing Medical Personnel Speech Recognition Models Using Speech Synthesis and Reinforcement Learning
PublikacjaText-to-Speech synthesis (TTS) can be used to generate training data for building Automatic Speech Recognition models (ASR). Access to medical speech data is because it is sensitive data that is difficult to obtain for privacy reasons; TTS can help expand the data set. Speech can be synthesized by mimicking different accents, dialects, and speaking styles that may occur in a medical language. Reinforcement Learning (RL), in the...
-
New Design of Axial Piston Pump with Displaced Swash Plate Axis of Rotation for Hydro-Mechanical Transmissions
PublikacjaThis paper presents a prototype design of an axial piston pump with displaced swash plate axis of rotation in two directions of discharge with electronic control intended for installation on a hydraulic-mechanical gearbox dedicated to working machines. The effect of displacement of the swash plate rotation axis on dead space volume and volumetric efficiency is presented. The construction and principle of operation of the capacity...
-
Managing the security vulnerabilities of critical systems and hazardous plants
PublikacjaRozdział poświęcono aktualnym problemom zarządzania ochroną obiektów podwyższonego ryzyka jako ważnych systemów infrastruktury krytycznej. Zarządzanie odpornością na ataki takich obiektów jest oparte na ocenach ryzyka. Podkreśla się, że występują ważne instalacje i systemy wymagające specjalnej uwagi i zabezpieczeń, szczególnie systemy kontroli dostępu do sterowni i urządzeń komunikacji. Opisuje się przykładowe technologie ochrony....
-
Security-oriented agile approach with AgileSafe and OWASP ASVS
PublikacjaIn this paper we demonstrate a security enhancing approach based on a method called AgileSafe that can be adapted to support the introduction of OWASP ASVS compliant practices focused on improving security level to the agile software development process. We also present results of the survey evaluating selected agile inspired security practices that can be incorporated into an agile process. Based on the survey’s results, these...
-
Security Evaluation of IT Systems Underlying Critical Networked Infrastructures
PublikacjaCritical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...
-
Focus on Misinformation: Improving Medical Experts’ Efficiency of Misinformation Detection
PublikacjaFighting medical disinformation in the era of the global pandemic is an increasingly important problem. As of today, automatic systems for assessing the credibility of medical information do not offer sufficient precision to be used without human supervision, and the involvement of medical expert annotators is required. Thus, our work aims to optimize the utilization of medical experts’ time. We use the dataset of sentences taken...
-
Endoscopy video analysis algorithms and their independence of rotation , brightness , contrast , color and blur
PublikacjaThe article presents selected image analysis algorithms for endoscopy videos. Mathematical methods that are part of these algorithms are described, and authors’ claims about the characteristics of these algorithms, such as the independence of rotation, brightness, contrast, etc. are mentioned. Using the common test on the real endoscopic image database and a set of image transformations, the validity of these claims was checked...
-
An improved frequency estimator for an adaptive active noise control scheme
PublikacjaAn improved frequency tracker is proposed for the recently introduced self optimizing narrowband interference canceller (SONIC). The scheme is designed for disturbances with quasi-linear frequency modulation and, under second-order Gaussian random-walk assumption, can be shown to be statistically efficient. One real-world experiment and several simulations show that a considerable improvement in disturbance rejection may be achieved...
-
Wybrane problemy ochrony żeglugi (Maritime Security)
Publikacjaprzedstawiono zagadnienia ochrony żeglugi w aspekcie uwarunkowań związanych z radiokomunikacją morską. Opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS (International Ship and Port Facility Security Code) i Statkowy System Alarmowania - SSAS (Ship Security Alert System) oraz także scharakteryzowano system AIS (Automated Information System) i System Identyfikacji i Śledzenia Dalekiego Zasięgu - LRIT (Long...
-
Algorithms for testing security in graphs
PublikacjaIn this paper we propose new algorithmic methods giving with the high probability the correct answer to the decision problem of security in graphs. For a given graph G and a subset S of a vertex set of G we have to decide whether S is secure, i.e. every subset X of S fulfils the condition: |N[X] \cap S| >= |N[X] \ S|, where N[X] is a closed neighbourhood of X in graph G. We constructed a polynomial time property pseudotester based...
-
The methods of secure data transmission in the KNX system
PublikacjaThe article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.