Filtry
wszystkich: 4049
-
Katalog
- Publikacje 2441 wyników po odfiltrowaniu
- Czasopisma 368 wyników po odfiltrowaniu
- Konferencje 202 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 311 wyników po odfiltrowaniu
- Projekty 14 wyników po odfiltrowaniu
- Laboratoria 1 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Aparatura Badawcza 1 wyników po odfiltrowaniu
- Kursy Online 148 wyników po odfiltrowaniu
- Wydarzenia 6 wyników po odfiltrowaniu
- Dane Badawcze 555 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: COMPUTER SECURITY LABORATORY
-
On UMTS security.
PublikacjaW artykule zaprezentowano przegląd hipotetycznych ataków na sieci i systemy telekomunikacji ruchomej, w tym systemy UMTS. Uwzględniono: podsłuch, nieautoryzowany dostęp, celowe zakłócanie oraz ataki typu DoS. Zaprezentowano mechanizmy podnoszące bezpieczeństwo pracy UMTS, w szczególności wprowadzające identyfikację i ''rozwinięte'' uwierzytelnianie a także kompleksową autoryzację dostępu.
-
Utilization of fuzzy rules in computer character animation
PublikacjaThe chapter presents a method for automatic enhancement of computer character animation utilizing fuzzy inference. First the user designs a prototype version of animation, with keyframes only for important poses, roughly describing the action. Then animation is enriched with new motion phases calculated by the fuzzy inference system using descriptors given by the user. Various degrees of motion fluency and naturalness are possible...
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublikacjaAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Internal Security
Czasopisma -
Laboratory assessment of permeability of sand and biopolymer mixtures
PublikacjaLaboratory assessment of permeability of sand and biopolymer mixtures. This research presents a method of creating seepage barriers in a sandy soil using biopolymer additives (biosubstance), which consist of polysaccharides and water. Polysaccharides strongly interact with water to produce a viscous suspension. The paper aims to investigate the infl uence of a biosubstance employed in a highly permeable sandy soil. Amount of the...
-
Software modules and application layer's security structure of RSMAD
PublikacjaThe paper discusses the software modules of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The structure of the application layer of the system has also been analysed in details, including: purpose, structure and principles of operation of software modules constituting this system. In addition, the paper presents and discusses the structure of security of application layer...
-
Integrated approach for functional safety and cyber security management in maritime critical infrastructures
PublikacjaThe work is devoted important issues of the management in maritime critical infrastructure of functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to cyber security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with...
-
Quality Model for Integrated Security Monitoring and Control in Water Distribution Systems
PublikacjaThis article addresses the problem of drinking water distribution system (DWDS) security in the terms of water quality which in the era of terrorist threat is of high importance to the public. The contribution of this paper is the development of the so called security module to extend a multi-species water quality model. This gives an insight to the situation in DWDS not only under normal operational conditions but also in case...
-
Deep Instance Segmentation of Laboratory Animals in Thermal Images
PublikacjaIn this paper we focus on the role of deep instance segmentation of laboratory rodents in thermal images. Thermal imaging is very suitable to observe the behaviour of laboratory animals, especially in low light conditions. It is an non-intrusive method allowing to monitor the activity of animals and potentially observe some physiological changes expressed in dynamic thermal patterns. The analysis of the recorded sequence of thermal...
-
Uncertainty assessment in the safety and security oriented risk analyses
PublikacjaW artykule przedstawiono uwzględnienie oceny niepewności w procesie związanym z analizą ryzyka i analizą bezpieczeństwa oraz ochroną informacji. Przedstawiona została koncepcja oceny bezpieczeństwa i zarządzania ryzykiem z uwzględnieniem analizy warstw zabezpieczeń LOPA. W artykule nakreślono wyzwania związane z integracją podejścia oceny bezpieczeństwa (safety) i ochrony informacji (security) w projektowaniu systemów zabezpieczeń...
-
Heuristic scheduling algorithms for uniform load of computer system
PublikacjaW pracy zaprezentowano opracowany heurystyczny algorytm szeregowania zadań UNILO (ang. UNIform LOad - jednakowe obciążenie), umożliwiający redukcję całkowitego zapotrzebowania na moc obliczeniową systemu komputerowego bez pogarszania jego wydajności. Algorytm ten realizuje takie przydzielenie zadań obliczeniowych do poszczególnych jednostek (procesorów), aby zapewnić ich jednakowe obciążenie. Opracowany algorytm został zweryfikowany...
-
ASON/GMPLS connection control servers in virtual computer environment
PublikacjaIn the paper ASON/GMPLS connection control servers layer in the context of Next Generation Network (NGN) is described. The implementation of ASON/GMPLS connection control servers in virtual computer environment as well as performed measurements are presented. Some aspects of virtual environment installation are depicted. Remarks regarding application of the virtual computer environment to realization of communication between NGN...
-
3D Computer Model of the Hip Joint Cartilage
PublikacjaThis paper presents 3D computer model of the hip joint cartilage in the ANSYS program. Model is made on the basis of anatomy and collected data on the material constants of bone and cartilage components. Analysis and comparison of biochemical model, viscoelastic and molecular mixed - aggregation serves to facilitate the creation of the next model of reality, which could be used in the design of joint prostheses. The correctness...
-
An Attempt to Develop a Model Selection Algorithm of Computer Simulation during the Design Process of Mechanical Response of Any Mechanical Body
PublikacjaIn the literature, there are algorithms associated with the design of simulations of technological processes, in which the material model has always been defined previously. However, in none of the studies of computer simulation modelling of technological processes known to the authors of this article, is there a detailed description of how the algorithm, or the selection of plastic model used, is subject to this process. This...
-
Metabolomics for laboratory diagnostics
Publikacja -
Supporting Compliance with Security Standards by Trust Case Templates
PublikacjaTrust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....
-
Computer Supported Analysis of the Human Body Surface Area
PublikacjaRecent scientific studies show the growing importance of the coefficients: BSA and TBSA, as an alternative to the widely used BMI. The relevant indicators are widely used in medicine, including such areas as: the treatment of burns, chemotherapy, dermatology and toxicology; as benchmarks when calculating doses of drugs and fluids. The particular problems concerning this subject are: the change of the reference parameter value which...
-
Controlling computer by lip gestures employing neural network
PublikacjaResults of experiments regarding lip gesture recognition with an artificial neural network are discussed. The neural network module forms the core element of a multimodal human-computer interface called LipMouse. This solution allows a user to work on a computer using lip movements and gestures. A user face is detected in a video stream from a standard web camera using a cascade of boosted classifiers working with Haar-like features....
-
Enhancing Security of Advanced Metering Infrastructure by Introducing Threshold Attendance Protocol
PublikacjaThe industry pushes towards smart grid systems in order to resolve current limitations of the unidirectional legacy power grid infrastructure. By introducing Advanced Metering Infrastructure (AMI) as an integral part of the smart grid solution, the utility company obtains an invaluable tool to optimize its network, lower the operational costs, and improve quality of service. Unfortunately, introducing two-way communication poses...
-
Investigation of Acoustic Properties of Poroelastic Asphalt Mixtures in Laboratory and Field Conditions
PublikacjaMeasures for the improvement of acoustic conditions in the vicinity of roads include the construction of pavement structures with low-noise surfaces with optimal macrotexture and the highest possible sound absorption coefficient. Laboratory evaluation of acoustic properties of a designed asphalt mixture before its placement in the pavement is a good solution. Currently, the most popular method for the determination of the sound...
-
Harmonics produced by traction substations – computer modelling and experimental verification
PublikacjaVoltage and current harmonics have a detrimental effect on the components of a power system. Current harmonics may result in the overload and damage to power transformers. Voltage harmonics may result in, for example, damage to capacitor banks used to compensate reactive power. Devices which contribute to both current and voltage distortion include traction rectifiers. This paper presents results of the computer investigation of...
-
Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
PublikacjaSustainable operation of Critical Infrastructure Systems (CISs) is of a major concern to modern societies. Monitoring, control and security of such systems plays a key role in guaranteeing continuous, reliable and above all secure access to the resources provided by these systems. Development of adequate software and hardware structures, as well as algorithms to perform such functions cannot be done apart from the operational conditions...
-
Bezpieczny Pracownik w Cyberprzestrzeni – Security Awareness
Kursy Online -
Determination of the shape of the CFGFT cylindrical column based on laboratory tests
PublikacjaAnalyses were carried out on glass-fibre-reinforced polymer tube columns with reference to laboratory tests. The angles of the glass fibre beams were 20◦, 55◦ and 85◦. The study employed non-classical operational calculus. Various modulated harmonic signal shapes were considered for columns and tubes at buckling. The buckling loads were assessed and compared for different models.
-
Biochemistry - Laboratory exercises
Kursy OnlineExerise 1. The ability to accumulate metal cations by edible mushrooms, comparison with edible plants Exercise 2. Measurement of activity of glutathione S-transferases - the detoxifying enzymes present in the cytosol of eukaryotic cells Exercise 3. Cell membranes permeability Exercise 4. Detection of mutagenic substances using Ames test Exercise 5. Gluten content in food products part 1. Exercise 6. Gluten content in food...
-
Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm
PublikacjaWe consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...
-
Application of the Regional Security Complex Theory for Security Analysis in the Persian Gulf
Publikacja -
Computer controlled systems - 2022/2023
Kursy Onlinemateriały wspierające wykład na studiach II stopnia na kierunku ACR pod tytułem komputerowe systemy automatyki 1. Computer system – controlled plant interfacing technique; simple interfacing and with both side acknowledgement; ideas, algorithms, acknowledge passing. 2. Methods of acknowledgement passing: software checking and passing, using interrupt techniques, using readiness checking (ready – wait lines). The best solution...
-
Deep learning based thermal image segmentation for laboratory animals tracking
PublikacjaAutomated systems for behaviour classification of laboratory animals are an attractive alternative to manual scoring. However, the proper animals separation and tracking, especially when they are in close contact, is the bottleneck of the behaviour analysis systems. In this paper, we propose a method for the segmentation of thermal images of laboratory rats that are in close contact during social behaviour tests. For this, we are...
-
Integrated controller for ultra high frequency technique laboratory
PublikacjaDepartment of Microwave and Antenna Engineering decided to modernize the laboratory of Ultra High Frequency Techniques. The main change was to replace measurement of the field distribution inside rectangular waveguides by analysing the fields around striplines. This involved the need to overcome several technical and conceptual problems. Precise positioning of the probe and reading the field distribution near the stripline is important...
-
Social media and efficient computer infrastructure in smart city
PublikacjaSocial media require an efficient infrastructures of computer and communication systems to support a smart city. In a big city, there are several crucial dilemmas with a home and public space planning, a growing population, a global warming, carbon emissions, a lack of key resources like water and energy, and a traffic congestion. In a smart city, we expect an efficient and sustainable transportation, efficient management of resources...
-
Adaptive acoustic crosstalk cancellation in mobile computer device
PublikacjaThe cancellation of acoustic crosstalk is employed to enhance the stereo image in mobile listening conditions. A practical setup employing a mobile computer is employed. The adaptation of the crosstalk cancellation filter to the position of the listener's head is featured. The measurement evaluating the possibility of practical application of the method are described. The head and torso simulator was used for measurements. The...
-
Security and knowledge management
PublikacjaOmówiono zagadnienia związane z problemami bezpieczeństwa w obszarach technologicznego wspomagania zarządzania wiedzą.
-
Security of Web Services
PublikacjaArtykuł przedstawia zagadnienia związane tematycznie z Web Services. W szczególności dotyczy problemów związanych z zapewniwniem poufności i integralności danych. Zdefiniowano model bezpieczeństwa Web Services integrujący trzy główne technologie: SOAP, UDDI, WSDL.
-
MECHANICAL PROPERTIES OF BOTTOM ASH – DREDGED MATERIAL MIXTURES IN LABORATORY TESTS
PublikacjaBottom ash from EC Gdańsk and dredged material taken from the mouth of The Vistula were mixed to form an engineering material used for dike construction. Mixtures with different bottom ash content were tested in laboratory to determine its basic physical and mechanical properties. The optimum bottom ash–dredged material mixture, built in the corps of the test dike, contains 70% of ash. The optimum bottom ash content in the mixture...
-
Portable raman spectrometer for maritime security applications
PublikacjaThe fast identification of explosives, narcotics and other chemicals carried on board of ships or transported in containers to the harbors is an important problem of maritime security. Raman spectroscopy is widely used for fast identification of various chemicals. Continuous progress in the field of photonics has resulted in commercial availability of low-power compact Raman spectrometers which can be integrated into portable systems....
-
Determining and verifying the safety integrity level of the safety instrumented systems with the uncertainty and security aspects
PublikacjaSafety and security aspects consist of two different group of functional requirements for the control and protection systems. In the paper it is proposed that the security analysis results can be used as a factor increasing or decreasing the risk level. It concerns a process of determining required safety integrity level of given safety functions. The authors propose a new approach for functional safety risk analysis. In this case...
-
Essentials of computer science for Bachelor in Management students
Kursy OnlineVarious resources accompanying "Essentials of computer science" classes for Bachelor in Management 1st year students.
-
Gesture-based computer control system applied to the interactive whiteboard
PublikacjaIn the paper the gesture-based computer control system coupled with the dedicated touchless interactive whiteboard is presented. The system engineered enables a user to control any top-most computer application by using one or both hands gestures. First, a review of gesture recognition applications with a focus on methods and algorithms applied is given. Hardware and software solution of the system consisting of a PC, camera, multimedia...
-
Gesture-based computer control system applied to the interactive whiteboard
PublikacjaIn the paper the gesture-based computer control system coupled with the dedicated touchless interactive whiteboard is presented. The system engineered enables a user to control any top-most computer application by using one or both hands gestures. First, a review of gesture recognition applications with a focus on methods and algorithms applied is given. Hardware and software solution of the system consisting of a PC, camera, multimedia...
-
Blended Learning Model for Computer Techniques for Students of Architecture
PublikacjaAbstract: The article summarizes two-year experience of implementing hybrid formula for teaching Computer Techniques at the Faculty of Architecture at the Gdansk University of Technology. Original educational e-materials, consisting of video clips, text and graphics instructions, as well as links to online resources are embedded in the university e-learning educational platform. The author discusses technical constraints associated...
-
New Applications of Multimodal Human-Computer Interfaces
PublikacjaMultimodal computer interfaces and examples of their applications to education software and for the disabled people are presented. The proposed interfaces include the interactive electronic whiteboard based on video image analysis, application for controlling computers with gestures and the audio interface for speech stretching for hearing impaired and stuttering people. Application of the eye-gaze tracking system to awareness...
-
Safety integrity level verification for safety-related functions with security aspects
PublikacjaThe article is devoted some important issues of the functional safety analysis, in particular the safetyintegrity level (SIL) verification of safety functions to be implemented within the distributed controland protection systems with regard to cyber security aspects. The procedure for functional safety man-agement includes hazard identification, risk analysis and assessment, specification of overall safetyrequirements and definition...
-
Clinical Laboratory
Czasopisma -
Laboratory Phonology
Czasopisma -
LABORATORY ANIMALS
Czasopisma -
Paweł Czarnul dr hab. inż.
OsobyPaweł Czarnul uzyskał stopień doktora habilitowanego w dziedzinie nauk technicznych w dyscyplinie informatyka w roku 2015 zaś stopień doktora nauk technicznych w zakresie informatyki(z wyróżnieniem) nadany przez Radę Wydziału Elektroniki, Telekomunikacji i Informatyki Politechniki Gdańskiej w roku 2003. Dziedziny jego zainteresowań obejmują: przetwarzanie równoległei rozproszone w tym programowanie równoległe na klastrach obliczeniowych,...
-
Redesign of the Research Platform for Monitoring, Control and Security of Critical Infrastructure Systems
PublikacjaCritical Infrastructure Systems (CISs) play a key role in modern societies. Their sustainable operation depends heavily on the performance of dedicated structures and algorithms targeting monitoring, control and security aspects. In previous work a Research Platform (RP) for the design and simulation of such systems was presented. This works updates the information on the RP through the description of major hardware and software...
-
Computer Support of Analysis of Optical Spectra Measurements
PublikacjaThe verification of measurement errors has a big impact on the assessment of the accuracy of conducted measurements and obtained results. In many cases, computer simulation results are compared with measurement results in order to evaluate measurement errors. The purpose of our research was to check the accuracy of measurements made with a Fabry–Perot interferometer working in the transmission mode. In the measurement setup, a...
-
Computer support of analysis optical spectra measurements
PublikacjaVerification of measurement errors has a big impact on assessment of accuracy of conducted measurements and obtained results. In many cases computer simulation results are compared with measurement results in order to evaluate measurement errors. The purpose of our research was to check the accuracy of measurements made with Fabry-Perot interferometer working in the transmission mode. In measurement setup, a 1310 nm superluminescent...