Wyniki wyszukiwania dla: PRESENTATION ATTACK DETECTIONS
-
EU-Turkey Customs Union and Bilateral Foreign Direct Investment Flows
PublikacjaMain aim of this text is presentation of the effects of customs union between the European Union and turkey on bilateral FDI flows in light of the theory of linkages between economic integration and FDI flows. First section of the text is a survey of main theoretical links between economic integration and FDI flows. Second section focuses on the history and scope of the customs union. Third and fourth sections are empirical and...
-
Detailed results of shaping personnel risk factors in enterprise D
Dane BadawczeThe data presents the shape of all the researched personnel risk factors in the D enterprise (which was tested by the author). Further considerations should be started with the presentation of the synthesis of the obtained results, which is presented in this research data.
-
THE USE OF GREEN LOGISTICS ELEMENTS DURING THE CONSTRUCTION OF OFFSHORE VESSELS
PublikacjaThe article is aimed at the presentation referring to the use of green logistics elements during the construction of the offshore vessels in the following aspects: collection, removal and utilisation of any waste that is harmful for natural environment, elimination of the negative impact that such waste can have on natural environment and the search for the optimal solutions as regards these aspects.
-
Mesh dependence study for numerical assessment of hydrodynamic characteristics of windsurfing fin
PublikacjaThe presented research aims to assess the drag coefficient and lift coefficient versus angle of attack curves for windsurfing fin. Special attention in the research was being paid to the evaluation of the stall angle value. The angle of incidence for which the stall occurs was searched, and the sensitivity of the solution for the mesh resolution was studied. The mesh resolution sensitivity analysis was done by systematically decreasing...
-
Possible uses of crisis situation aiding system in virtual world simulation
PublikacjaMany of the real world crisis situations like spreading fire, hostile units attack, flood, and etc. are commonly used in computer games where a simulation of extensive virtual world is crucial. This paper presents some ideas for possible uses of existing crisis situation aiding system in such environments. Moreover, it shows how this kind of system can be taught during subsequent games with a large number of players. As an example...
-
Performance evaluation of GPS anti-spoofing system based on antenna array processing
PublikacjaThis article concerns the problem of detection and mitigation of spoofing attacks in Global Navigation Satellite Systems. First, background information about spoofing and its possible countermeasures is provided. Next, concept of a novel GPS anti-spoofing system based on antenna array processing is presented and implementation of prototype of this system is described. The third section outlines the performance evaluation of proposed...
-
Selfish Attacks in Two-Hop IEEE 802.11 Relay Networks: Impact and Countermeasures
PublikacjaIn IEEE 802.11 networks, selfish stations can pursue a better quality of service through selfish MAC-layer attacks. Such attacks are easy to perform, secure routing protocols do not prevent them, and their detection may be complex. Two-hop relay topologies allow a new angle of attack: a selfish relay can tamper with either source traffic, transit traffic, or both. We consider the applicability of selfish attacks and their variants...
-
Numerical methods in heat and fluid flow
Kursy OnlinePresentation of issues concerning mathematical modelling of power installations, including thermodynamic cycles and selected devices of power installations using commercial codes, so that the student is able to properly model the process and interpret the results. Presentation of capabilities of CFD code.
-
Images of topography and mechanical properties (phase imaging) of cast iron samples from water installations
Dane BadawczeMeasurements in contact and semi-contact mode. NTEGRA Prima (NT-MDT) device. CSG 10.
-
Wordventure - cooperative wordnet editor. Architecture for lexical semantic aquisition
PublikacjaThis article presents architecture for acquiring lexical semanticsin a collaborative approach paradigm. The system enablesfunctionality for editing semantic networks in a wikipedia-like style. The core of the system is a user-friendly interface based on interactive graph navigation.It has been used for semantic network presentation,and brings simultaneously modification functionality.
-
The Novel Findings About the Hussite’s Warfares in the Gdansk/Danzig Surrounding in the Late Summer of 1433
PublikacjaOne of the most spectacular episodes during the Hussite Wars was the Czech raid through the lands of the Teutonic Order up to the Baltic Sea in 1433. Although historians and then-witnesses focused on the sacked Cistercian Abbey in Oliva and soldiers filling the bottles with seawater, the scale of damages in the main harbour of Prussia and its surroundings has not been the subject of research yet. Furthermore, most scholars treatthe...
-
The concept of improving warehouse management in the X production company
PublikacjaThe article aims at the presentation of a concept referring to the improvement of warehouse management in the X production plant. The authors suggest two solutions: using storage racks at the picking process site and warehouse automation. Ultimately, the authors of the article present their basic calculation of the costs, indicating the increase in efficiency after the implementation of the discussed...
-
WordVenture - COOPERATIVE WordNet EDITOR Architecture for Lexical Semantic Acquisition
PublikacjaThis article presents architecture for acquiring lexical semantics in a collaborative approach paradigm. The system enables functionality for editing semantic networks in a wikipedia-like style. The core of the system is a user-friendly interface based on interactive graph navigation. It has been used for semantic network presentation, and brings simultaneously modification functionality.
-
Overhead wires detection by FPGA real-time image processing
PublikacjaThe paper presents design and hardware implementation of real-time image filtering for overhead wires detection divided on image processing and results presentation blocks. The image processing block was separated from the whole implementation, and its delay and hardware complexity was analysed. Also the maximum frequency of image processing of the proposed implementation was estimated.
-
Impedance Spectra of RC Model as a Result of Testing Pulse Excitation Measurement Method Dataset
PublikacjaThe dataset titled Impedance spectra of RC model as a result of testing pulse excitation measurement method contains the impedance spectrum of an exemplary test RC model obtained using pulse excitation. The dataset allows presentation of the accuracy of the impedance spectroscopy measuring instrument, which uses the pulse excitation method to shorten the time of the whole spectrum acquisition.
-
Usability Techniques Possible to Use in Diagnostic Tools Interface Improvement
PublikacjaThe development of diagnostic tools has caused a rapid increase in the amount of information generated and presented, necessitating the use of computer displays as an interface to data presentation and the use of modern diagnostic tools. The paper presents methods for testing usability that can be used in designing and improving the quality of interfaces of modern diagnostic tools that use communication through graphical user interfaces.
-
Influence of windsurfing fin stiffness distribution on the lift-drag characteristics
PublikacjaThis article addresses the problem of determining the hydromechanical loads generated by flexible hydrofoils. The research was done on the example of the composite windsurfing fin for the RS:X monotype class. Despite the assumption of fins identity, everyday practice showed that variations of mechanical properties occur and strongly affect their performance. Therefore, we decided to study the differences between the windsurfing...
-
Gesture recognition framework for multimedia content viewer controlling
PublikacjaIn the paper a system for controlling a multimedia content viewer by hand gestures is presented. First, selected methods used for gesture recognition are described. Two different application cases of the system, i.e. for multimedia presentation purposes and for multimedia content viewing are outlined. Moreover, a proposal of improvement of the system combining these approaches is also given. The system work cycle is reviewed. The...
-
Coastal Cliffs Monitoring and Prediction of Displacements Using Terrestial Laser Scanning
PublikacjaCoastal cliffs are very sensitive to degradation caused by erosion and abrasion. Thus, it is very important to monitor susceptibility of the cliffs in terms of slope angles and ground fall resulting from vertical morphology of the cliffs. The results could be used for example to establish the boundaries of the safe investments zone or retreat infrastructure buildings in case of real threat such as degradation of the objects of...
-
Analysis of impact of audio modifications on the robustness of watermark for non-blind architecture
PublikacjaThe aim of this paper is to assess the robustness of the non-blind audio content watermarking scheme proposed by the authors. The authors present the architecture of the designed system along with the employed workflows for embedding and extracting the watermark followed by the implementation phase description and the analysis of the experimental results. Some possible attack simulations on the embedded watermarks are reviewed,...
-
Diver Observations by Means of Acoustic Methods
PublikacjaSearching for objects, especially small ones, moving under water near its the free surface, is always not an easy task. Designing tools for the detection of such targets is a real challenge when the possibility of a terrorist attack is a real threat. This paper presents some aspects of diver detection by means of acoustics methods, both active (side scan sonar) and passive ones (linear receiving antenna). This approach is quite...
-
Systemy Smart Cities - studium przypadku
PublikacjaThe paper presents the architecture of an enterprise service bus used in the construction of information systems processing large amounts of data for decision-making needs at the City Hall in Gdańsk. The key concept of processes of bus development involves installation of developing environment, database connection, flow mechanisms and data presentation. The issue was supported by models such as KPI (Key Processes Identifier) and...
-
Pomiarowa ocena efektywności systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym
PublikacjaNiniejszy referat dotyczy problemu wykrywania i przeciwdziałania atakom typu spoofing w globalnych systemach nawigacji satelitarnej. Pierwsza część referatu stanowi wprowadzenie w temat spoofingu oraz przegląd sposobów jemu przeciwdziałania. Następnie, przedstawiono autorską koncepcję systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym, a także opisano implementację prototypu tego systemu. Część trzecią poświęcono...
-
How Can We Identify Electrophysiological iEEG Activities Associated with Cognitive Functions?
PublikacjaElectrophysiological activities of the brain are engaged in its various functions and give rise to a wide spectrum of low and high frequency oscillations in the intracranial EEG (iEEG) signals, commonly known as the brain waves. The iEEG spectral activities are distributed across networks of cortical and subcortical areas arranged into hierarchical processing streams. It remains a major challenge to identify these activities in...
-
STEROWANIE I MONITOROWANIE SIECI WYDZIELONEJ Z ODNAWIALNYMI ŹRÓDŁAMI ENERGII
PublikacjaW artykule przedstawiono zagadnienia związane z opracowaniem dedykowanego oprogramowania systemu sterowania i monitorowania odnawialnymi źródłami energii w sieci wydzielonej. Do implementacji systemu wykorzystano stanowisko laboratorium Systemów Sterowania w Energetyce Odnawialnej Wydziału Elektrotechniki i Automatyki Politechniki Gdańskiej. Opracowane oprogramowanie wykorzystuje platformę Windows Presentation Foundation oraz wzorzec...
-
Device for spoofing in global positioning system
PublikacjaThis article describes the device which may be used to generate false GPS signals and emit them into radio communication channel. Such attack is called GPS spoofing. Each GPS receiver which remains in the range of a spoofing device (called spoofer) indicates time and position coordinates which are predetermined by the spoofer’s operator. Spoofing may be used e.g. in order to disable the terrorist group from obtaining correct navigation...
-
Sustainable development on the background of a general theory of regional development
PublikacjaThe article focuses on a presentation and discussion of the concept of "sustainable de-velopment" (SD). It contains an analysis of the concept, its characteristics, objectives and principles of implementation. Particular emphasis has been placed on presentation of the unique features of sustainable development that distinguish it from other theories of regional development. Therefore, the discussion has been preceded by a discussion...
-
Cooperative Word Net Editor for Lexical Semantic Acquisition
PublikacjaThe article describes an approach for building Word Net semantic dictionary in a collaborative approach paradigm. The presented system system enables functionality for gathering lexical data in a Wikipedia-like style. The core of the system is a user-friendly interface based on component for interactive graph navigation. The component has been used for Word Net semantic network presentation on web page, and it brings functionalities...
-
Towards 5G — Cloud-based Radio Access Networks
PublikacjaIn the paper a general concept of the 5G network architecture is presented as well as system requirements having impact on innovative solutions in the 5G network are highlighted. A major part of the paper is both presentation and discussion of the problem of Cloud Radio Access Network introduction for public networks in which the cell and resource virtualisation will be implemented. On the other hand, the problem of resource virtualization...
-
Historical crane on the redesigned original trestle bridge as a memorial of Gdansk Shipyard
PublikacjaThe paper includes selected aspects of the study, whose goal is to hold the historical crane 642-24 in its current location after the modification of trestle bridge static scheme. The scope of the paper includes the assessment of current technical condition of the object, a presentation of FEM analyses, a description of the assumed load cases, results of the static calculations, checking the effort of construction elements, global...
-
Detection of illicit chemicals by portable Raman spectrometer
PublikacjaThe Raman spectrometers can be built as the portable devices and can be used in various places to detect illicit chemicals. This method has become popular due to deficiency of other fast methods that could be applied against terrorist attacks or could help police at their work. The conception of a portable Raman spectrometer has been presented. The description enclosures presentation of the prepared device and its possible applications...
-
Pipeline geometry defects in high resolution pig's data
PublikacjaMost of the pipelines have been inspected at least once using intelligent pigging. The problem of specific software for interactive presentation, analysis and comparison of features revealed during the consecutive geometry surveys is emphasized. Capabilities of a simultaneous measurement of internal geometry and metal loss features in a single run are illustrated. Advantages of application of statistical characteristics of both...
-
The use of innovative application in creating new marketing space for cultural and entertainment events in the local market
PublikacjaThe following article describes the problems concerning marketing of mass events in the local market and potential solutions. In the first part the barriers that occur in communication between the organizers and the articipants are defined. In the process of identifying problems the results of research conducted for the needs article were used. In following sections the solution with use of Smartphone app is shown. The features that...
-
Improved jamming resistance using electronically steerable parasitic antenna radiator
PublikacjaThis paper presents an idea of using an Electronically Steerable Parasitic Antenna Radiator (ESPAR) for jamming suppression in IEEE 802.11b networks. Jamming (intentional interference) attacks are known to be effective and easy to perform, which may impose connectivity problems in applications concerning Internet of Things (IoT). In our paper, theoretical considerations are presented and the results of experiments performed in...
-
Applicability of null-steering for spoofing mitigation in civilian GPS
PublikacjaCivilian GPS signals are currently used in many critical applications, such as precise timing for power grids and telecommunication networks. Spoofing may cause their improper functioning. It is a threat which emerges with the growing availability of GPS constellation simulators and other devices which may be used to perform such attack. Development of the effective countermeasures, covering detection and mitigation, is necessary...
-
COMPLEXITY OF INNOVATIVE FINANCIAL PRODUCTS: THE CASE OF SYNTHETIC EXCHANGE TRADED FUNDS IN EUROPE
PublikacjaThe aim of the text is the presentation of the most important categories of exchange traded funds (ETFs) – physical and synthetic ones. A theoretical part of the text includes an overview of the main features of ETFs, the presentation of differences between physical and synthetic funds and the main risks posed by both types to their users and the whole financial systems. An empirical part focuses on the European market. Time span...
-
DEVELOPMENT OF THE ALGORITHM OF POLISH LANGUAGE FILM REVIEWS PREPROCESSING
PublikacjaThe algorithm and the software for conducting the procedure of Preprocessing of the reviews of films in the Polish language were developed. This algorithm contains the following steps: Text Adaptation Procedure; Procedure of Tokenization; Procedure of Transforming Words into the Byte Format; Part-of-Speech Tagging; Stemming / Lemmatization Procedure; Presentation of Documents in the Vector Form (Vector Space Model) Procedure; Forming...
-
BUILDING STRUCTURES AND TECHNOLOGIES_2023/2024
Kursy OnlineAssessment criteria of the subject:- written exam at the end of classes in june;- presentation on a building constructed inreinforced concrete technology;- attendance in lectures.
-
A universal IT system architecture for servicing, collecting, storing, processing and presenting data from wireless devices
PublikacjaIn the article we present a universal IT system architecture, which allows one to develop, based on mobile and multiplatform JAVA language, applications capable of working with many different wireless systems in an easy and effective way. Modular system architecture supports efficient data processing and enables convenient presentation of chosen parameters. Additionally, proposed IT system architecture provides easy adoption to...
-
Security Evaluation of IT Systems Underlying Critical Networked Infrastructures
PublikacjaCritical infrastructures have become highly dependent on information and communication technology (ICT). The drawback of this situation is that the consequences of disturbances of the underlying ICT networks may be serious as cascading effects can occur. This raises a high demand for security assurance, with a high importance assigned to security evaluations. In this paper we present an experiment-centric approach for the characterisation...
-
Influence of the Square Wave Voltage on Dynamical Properties of a Flat Voltammetric Electrode in the Time Domain by the Electrochemical Reversible Reaction
PublikacjaIn this article there is a presentation of the analysis of the polarizing voltage shape influencing dynamic properties of voltammetric electrodes when on their surface reversible reaction takes place in the time domain. The electrode polarization with linearly increasing voltage and with a square component, was analyzed. The analysis that were conducted showed that the voltammetric electrode behaves like a first order transducer....
-
Contextualizing a Knowledge Base by Approximation – A Case Study
PublikacjaModular knowledge bases give their users opportunity to store and access knowledge at different levels of generality. In this paper we present how to organize a modular knowledge bases organized into contexts in which a user can express their knowledge in much simplified way, yet without losing its precision. The work is centered around the notion of approximation - i.e. reducing the arity of predicates used. The presentation is...
-
Hybrid of Neural Networks and Hidden Markov Models as a modern approach to speech recognition systems
PublikacjaThe aim of this paper is to present a hybrid algorithm that combines the advantages ofartificial neural networks and hidden Markov models in speech recognition for control purpos-es. The scope of the paper includes review of currently used solutions, description and analysis of implementation of selected artificial neural network (NN) structures and hidden Markov mod-els (HMM). The main part of the paper consists of a description...
-
Quantum entanglement in time
PublikacjaIn this paper we present a concept of quantum entanglement in time in a context of entangled consistent histories. These considerations are supported by presentation of necessary tools closely related to those acting on a space of spatial multipartite quantum states. We show that in similarity to monogamy of quantum entanglement in space, quantum entanglement in time is also endowed with this property for a particular history....
-
Accuracy of Differential Phase Delay Estimation for GPS Spoofing Detection
PublikacjaGPS spoofing is an attack based on transmission of false signals to target receivers, in order to force the computation of incorrect time, position or velocity information. It is a threat which is recently considered with continuously growing awareness. There is a need for effective way of GPS spoofing detection. Many groups of methods are proposed in the literature. Spatial processing methods are considered to be robust in a wide...
-
Adenocarcinoma, NOS - Male, 65 - Tissue image [6210730043064931]
Dane BadawczeThis is the histopathological image of COLON tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Detailed results of shaping personnel risk factors in enterprise A
Dane BadawczeThe data presents the shape of all the researched personnel risk factors in the A enterprise (which was tested by the author). Further considerations should be started with the presentation of the synthesis of the obtained results, which is presented in this research data.
-
Detailed results of shaping personnel risk factors in enterprise B
Dane BadawczeThe data presents the shape of all the researched personnel risk factors in the B enterprise (which was tested by the author). Further considerations should be started with the presentation of the synthesis of the obtained results, which is presented in this research data.
-
Electrical Stimulation Modulates High Gamma Activity and Human Memory Performance
PublikacjaDirect electrical stimulation of the brain has emerged as a powerful treatment for multiple neurological diseases, and as a potential technique to enhance human cognition. Despite its application in a range of brain disorders, it remains unclear how stimulation of discrete brain areas affects memory performance and the underlying electrophysiological activities. Here, we investigated the effect of direct electrical stimulation...
-
State Interventionism in Tax System - Example of Action in a COVID-19 Crisis
PublikacjaThe following article presents and classifies changes in tax systems of selected countries as well as counts them as the response to the emergence of the crisis caused by the COVID-19 pandemic. Such actions were undertaken the context of state interventionism in the tax system. In order to achieve the objective of presenting the state interventionism in the context of tax rates, an analysis of the literature on the phenomenon described,...