Filtry
wszystkich: 1269
-
Katalog
- Publikacje 966 wyników po odfiltrowaniu
- Czasopisma 108 wyników po odfiltrowaniu
- Konferencje 80 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 30 wyników po odfiltrowaniu
- Projekty 8 wyników po odfiltrowaniu
- Kursy Online 16 wyników po odfiltrowaniu
- Dane Badawcze 60 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: SECURITY CONTROLS AND MEASURES
-
Equivalence of equicontinuity concepts for Markov operators derived from a Schur-like property for spaces of measures
PublikacjaVarious equicontinuity properties for families of Markov operators have been – and still are – used in the study of existence and uniqueness of invariant probability for these operators, and of asymptotic stability. We prove a general result on equivalence of equicontinuity concepts. It allows comparing results in the literature and switching from one view on equicontinuity to another, which is technically convenient in proofs....
-
User Trust Levels and Their Impact on System Security and Usability
PublikacjaA multilateral trust between a user and a system is considered. First of all we concentrate on user trust levels associated with the context-oriented CoRBAC model. Consequently, there were computed user profiles on the basis of its implementation in the information processing system “My GUT”. Furthermore, analysis of these profiles and the impact of user trust levels on system security and usability have been discussed.
-
On UMTS security.
PublikacjaW artykule zaprezentowano przegląd hipotetycznych ataków na sieci i systemy telekomunikacji ruchomej, w tym systemy UMTS. Uwzględniono: podsłuch, nieautoryzowany dostęp, celowe zakłócanie oraz ataki typu DoS. Zaprezentowano mechanizmy podnoszące bezpieczeństwo pracy UMTS, w szczególności wprowadzające identyfikację i ''rozwinięte'' uwierzytelnianie a także kompleksową autoryzację dostępu.
-
Internal Security
Czasopisma -
The Role of Greenery and Traffic Calming Measures in Planning of Road Infrastracture
PublikacjaThe role of greenery and traffi c calming measures in road infrastructure planning. The “life” of a town is connected with its infrastructure. So it is that, apart from serving their principal function, motorways, roads, airports and other facilities which make transport possible largely determine contemporary urban design. To achieve balanced forms of urban infrastructure that ensure comfort, safety and spatial order, it is necessary when...
-
Quantifying wage effects of offshoring: import- versus export-based measures of production fragmentation
PublikacjaIn this paper we examine the implications of international fragmentation of production on wages in the light of recent methodological developments in offshoring measurement. In particular, we compare the results stemming from two ways of quantifying offshoring – the traditional one based on import statistics and the one obtained from the decomposition of gross exports and input-output information. In the empirical part of our study,...
-
Software modules and application layer's security structure of RSMAD
PublikacjaThe paper discusses the software modules of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The structure of the application layer of the system has also been analysed in details, including: purpose, structure and principles of operation of software modules constituting this system. In addition, the paper presents and discusses the structure of security of application layer...
-
Integrated approach for functional safety and cyber security management in maritime critical infrastructures
PublikacjaThe work is devoted important issues of the management in maritime critical infrastructure of functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to cyber security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with...
-
Quality Model for Integrated Security Monitoring and Control in Water Distribution Systems
PublikacjaThis article addresses the problem of drinking water distribution system (DWDS) security in the terms of water quality which in the era of terrorist threat is of high importance to the public. The contribution of this paper is the development of the so called security module to extend a multi-species water quality model. This gives an insight to the situation in DWDS not only under normal operational conditions but also in case...
-
Chirality Measures of α-Amino Acids
Publikacja -
Postulates for measures of genuine multipartite correlations
PublikacjaA lot of research has been done on multipartite correlations. However, it seems strange thatthere is no denition of so called genuine multipartite correlations. In this paper we propose threereasonable postulates which each measure or indicator of genuine multipartite correlations (or gen-uine multipartite entanglement) should satisfy. We also introduce degree of correlations which givespartial characterization of multipartite...
-
Measures for Evaluation of Structure and Semantics of Ontologies
PublikacjaArtykuł przedstawia zagadnienie miar jakości ontologii ze szczególnym uwzględnieniem ich podziału na syntaktyczne (strukturalne) i semantyczne. Na tym tle przedstawione jest nowe podejście do pomiaru właściwości semantycznych ontologii bazujące na kartografii wiedzy.
-
Pests of Agricultural Crops and Control Measures
Publikacja -
Strategic Risk Measures in Road Traffic
Publikacja -
Uncertainty assessment in the safety and security oriented risk analyses
PublikacjaW artykule przedstawiono uwzględnienie oceny niepewności w procesie związanym z analizą ryzyka i analizą bezpieczeństwa oraz ochroną informacji. Przedstawiona została koncepcja oceny bezpieczeństwa i zarządzania ryzykiem z uwzględnieniem analizy warstw zabezpieczeń LOPA. W artykule nakreślono wyzwania związane z integracją podejścia oceny bezpieczeństwa (safety) i ochrony informacji (security) w projektowaniu systemów zabezpieczeń...
-
Effect of clonidine on growth hormone release in psychiatric patients and controls
Publikacja -
Reduction of road traffic noise by source measures — present and future strategies
PublikacjaThe current trend worldwide is less focused on reducing road traffic noise. This is in strong contrast to the severe impact of traffic noise to the general health and quality of life. A more holistic and combined strategy is needed. Current international rules and regulations regarding vehicles and tyres are not sufficient to reduce traffic noise levels in an effective way. Calculations show that these regulations will only yield...
-
Entropy Measures of heart rate variability for short ECG datasets in patients with congestive heart failure
PublikacjaWe investigated the usefulness of entropy measures calculated for short ECG series in distinguishing healthy subjects from patients with congestive heart failure (CHF). Four entropy measures were tested: Approximate Entropy (ApEn), Sample Entropy (SampEn), Fuzzy Entropy (Fuzzy En) and Permutation Entropy (PE), each computed for ECG series of 1000, 500, 250 and 100 RR intervals. We found that with a reduction of the data set length...
-
Entropy measures of heart rate variability for short ECG datasets in patients with congestive heart failure
PublikacjaWe investigated the usefulness of entropy measures calculated for short ECG series in distinguishing healthy subjects from patients with congestive heart failure (CHF). Four entropy measures were tested: Approximate Entropy (ApEn), Sample Entropy (SampEn), Fuzzy Entropy (FuzzyEn) and Permutation Entropy (PE), each computed for ECG series of 1000, 500, 250 and 100 RR intervals. We found that with a reduction of the data set length...
-
Supporting Compliance with Security Standards by Trust Case Templates
PublikacjaTrust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....
-
Enhancing Security of Advanced Metering Infrastructure by Introducing Threshold Attendance Protocol
PublikacjaThe industry pushes towards smart grid systems in order to resolve current limitations of the unidirectional legacy power grid infrastructure. By introducing Advanced Metering Infrastructure (AMI) as an integral part of the smart grid solution, the utility company obtains an invaluable tool to optimize its network, lower the operational costs, and improve quality of service. Unfortunately, introducing two-way communication poses...
-
Anti-theft lab security system based on RFID
PublikacjaThe aim of the project is to design and create an electronic system, which can be used to protect laboratory equipment against theft. The main task of the system is to warn a person responsible for the facilities about any attempts made to steal equipment from a laboratory. In a case of an alarm situation, the system emits a sound signal. The concept of the anti-theft security system based on RFID was developed on the basis of...
-
Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
PublikacjaSustainable operation of Critical Infrastructure Systems (CISs) is of a major concern to modern societies. Monitoring, control and security of such systems plays a key role in guaranteeing continuous, reliable and above all secure access to the resources provided by these systems. Development of adequate software and hardware structures, as well as algorithms to perform such functions cannot be done apart from the operational conditions...
-
Bezpieczny Pracownik w Cyberprzestrzeni – Security Awareness
Kursy Online -
Application of the Regional Security Complex Theory for Security Analysis in the Persian Gulf
Publikacja -
Security and knowledge management
PublikacjaOmówiono zagadnienia związane z problemami bezpieczeństwa w obszarach technologicznego wspomagania zarządzania wiedzą.
-
Security of Web Services
PublikacjaArtykuł przedstawia zagadnienia związane tematycznie z Web Services. W szczególności dotyczy problemów związanych z zapewniwniem poufności i integralności danych. Zdefiniowano model bezpieczeństwa Web Services integrujący trzy główne technologie: SOAP, UDDI, WSDL.
-
Portable raman spectrometer for maritime security applications
PublikacjaThe fast identification of explosives, narcotics and other chemicals carried on board of ships or transported in containers to the harbors is an important problem of maritime security. Raman spectroscopy is widely used for fast identification of various chemicals. Continuous progress in the field of photonics has resulted in commercial availability of low-power compact Raman spectrometers which can be integrated into portable systems....
-
Determining and verifying the safety integrity level of the safety instrumented systems with the uncertainty and security aspects
PublikacjaSafety and security aspects consist of two different group of functional requirements for the control and protection systems. In the paper it is proposed that the security analysis results can be used as a factor increasing or decreasing the risk level. It concerns a process of determining required safety integrity level of given safety functions. The authors propose a new approach for functional safety risk analysis. In this case...
-
Evaluation of urban freight transport management measures
Publikacja -
Similarity Measures for Face Images: An Experimental Study
PublikacjaThis work describes experiments aimed at finding a straightforward but effective way of comparing face images.We discuss properties of the basic concepts, such as the Euclidean, cosine and correlation metrics, test the simplest version of elastic templates, and compare these solutions with distances based on texture descriptors (Local Ternary Patterns). The influence of selected image processing methods (e.g. bilateral ltering)...
-
Application of nonlinearity measures to chemical sensor signals
PublikacjaSzumy rezystancji sensorów gazu zawierają istotną informację, która może być przedstawiona nie tylko przez ich gęstość widmową mocy. Analiza tych szumów za pomocą różnych miar nieliniowości może prowadzić do znacznego wzrostu selektywności i czułości czujników gazu. Stwierdzono, że dla dostępnych na rynku czujników gazu zastosowanie funkcji bispektrum dostarcza dodatkowej informacji, potrzebnej do detekcji różnych gazów. Analizując...
-
Invariant Measures for Uncountable Random Interval Homeomorphisms
PublikacjaA necessary and sufficient condition for the iterated function system { f (·, ω) | ω ∈ } with probability P to have exactly one invariant measure μ∗ with μ∗((0, 1)) = 1 is given. The main novelty lies in the fact that we only require the transformations f (·, ω) to be increasing homeomorphims, without any smoothness condition, nei- ther we impose conditions on the cardinality of . In particular, positive Lyapunov exponents conditions...
-
S6K1 controls autophagosome maturation in autophagy induced by sulforaphane or serum deprivation
Publikacja -
Safety integrity level verification for safety-related functions with security aspects
PublikacjaThe article is devoted some important issues of the functional safety analysis, in particular the safetyintegrity level (SIL) verification of safety functions to be implemented within the distributed controland protection systems with regard to cyber security aspects. The procedure for functional safety man-agement includes hazard identification, risk analysis and assessment, specification of overall safetyrequirements and definition...
-
Redesign of the Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
PublikacjaCritical Infrastructure Systems (CISs) play a key role in modern societies. Their sustainable operation depends heavily on the performance of dedicated structures and algorithms targeting monitoring, control and security aspects. In previous work a Research Platform (RP) for the design and simulation of such systems was presented. This works updates the information on the RP through the description of major hardware and software...
-
PUBLIC SOURCES OF FINANCE FOR CULTURE AS AN ELEMENT OF CULTURAL SECURITY IN POLAND
PublikacjaCulture is an important element of the country, playing an important role both for its security and the economy. It cannot be only seen as a cost-creating sector, but may be a significant factor in economic development. For this to happen, it is necessary to create a system of financing this economic sector. This article’s aim is to analyze the use of funds from public sources in Poland to finance culture-related activities. The...
-
LABOR RESOURCE MANAGEMENT AT THE MACRO LEVEL AS SOCIAL SECURITY IN THE CONTEXT OF EUROPEAN INTEGRATION
Publikacja -
Applying a Mesoscopic Transport Model to Analyse the Effects of Urban Freight Regulatory Measures on Transport Emissions—An Assessment
PublikacjaSustainable urban freight management is a growing challenge for local authorities due to social pressures and increasingly more stringent environmental protection requirements. Freight and its adverse impacts, which include emissions and noise, considerably influence the urban environment. This calls for a reliable assessment of what can be done to improve urban freight and meet stakeholders’ requirements. While changes in a transport...
-
Benchmarking Performance of a Hybrid Intel Xeon/Xeon Phi System for Parallel Computation of Similarity Measures Between Large Vectors
PublikacjaThe paper deals with parallelization of computing similarity measures between large vectors. Such computations are important components within many applications and consequently are of high importance. Rather than focusing on optimization of the algorithm itself, assuming specific measures, the paper assumes a general scheme for finding similarity measures for all pairs of vectors and investigates optimizations for scalability...
-
Knowledge-based functional safety and security management in hazardous industrial plants with emphasis on human factors
PublikacjaExisting and emerging new hazards have significant potential to impact destructively operation of technical systems, hazardous plants, and systems / networks of critical infrastructure. The programmable control and protection systems play nowadays an important role in reducing and controlling risk in the process of hazardous plant operation. It is outlined how to deal with security related hazards concerning such systems to be...
-
A review of the biogeochemical controls on the occurrence and distribution of polycyclic aromatic compounds (PACs) in coals
Publikacja -
Seismic pounding between adjacent buildings: Identification of parameters, soil interaction issues and mitigation measures
PublikacjaStructural pounding has been observed in many previous earthquakes due to insufficient gap commonly provided between adjacent structures. The collisions usually generate large impact forces and short duration acceleration pulses which may result in significant damage to the colliding buildings. Because of that, earthquake induced structural pounding has been intensively studied and investigated for the last three decades. Results...
-
The EU's Cyber Security Strategy
Publikacja -
Plant Biotechnology in Food Security
Publikacja -
Quantum security and theory of decoherence
PublikacjaWe sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...
-
On some aspects of maritime security
PublikacjaZostały przedstawione wybrane zagadnienia dotyczące ochrony żeglugi, w tym opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS, Statkowy System Alarmowania (SSAS) oraz system AIS i System Identyfikacji i Śledzenia Dalekiego Zasięgu (LRIT). Przedstawiono również znaczenie nowoczesnej telekomunikacji dla potrze sprawnej ochrony żeglugi na morzach i oceanach
-
Local chirality measures in QSPR : IR and VCD spectroscopy
Publikacja -
Experiment with small objects floating under water in the harbor security aspect.
PublikacjaObservation of the underwater area is the element of general trend which primary purpose is to protect and enhance the safety of the selected region. The aim of the paper is to present the acoustic characteristics of typical objects floating on the surface or under the water, which constitute some knowledge on how to detect these objects. Create a catalog of acoustic signatures and acoustic images of objects mostly floating under...
-
Mini-Cave Automatic Virtual Environment Application in Security, Safety, and Defence Studies
PublikacjaThe aim of the article is to analyse the use of mini-Cave Automatic Virtual Reality Environment (mini-CAVE) in academic studies on security, safety, and defence. The literature review based on Web of Science database and the case study of the War Studies University research activities indicated the mini-CAVE can be used in two areas as a research infrastructure and as a didactic tool. It can be concluded that due to the development...