Filtry
wszystkich: 4167
-
Katalog
- Publikacje 3176 wyników po odfiltrowaniu
- Czasopisma 265 wyników po odfiltrowaniu
- Konferencje 82 wyników po odfiltrowaniu
- Wydawnictwa 2 wyników po odfiltrowaniu
- Osoby 74 wyników po odfiltrowaniu
- Projekty 8 wyników po odfiltrowaniu
- Kursy Online 55 wyników po odfiltrowaniu
- Wydarzenia 1 wyników po odfiltrowaniu
- Dane Badawcze 504 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: PHYSICAL LAYER SECURITY
-
Radiokomunikacja morska - problemy eksploatacyjne i rozwój
PublikacjaW pracy omówiono stan obecny oraz wynikające z tego problemy eksploatacyjne występujące w radiokomunikacji morskiej, ze szczególnym odniesieniem do zagadnień związanych z bezpieczeństwem pracy na morzu. Scharakteryzowano kierunki rozwoju w obszarach głównych podsystemów składowych tej dziedziny łączności radiowej. Poruszono także coraz bardziej aktualny problem zastosowania systemów łączności dla potrzeb ochrony żeglugi (maritime...
-
Physical models in the education of architectural history
PublikacjaIn this article, the authors present the long tradition and common use of physical models in the process of teaching the history of architecture in higher education institutions. The research described in the article is focused on the use of physical models and mock-ups as stimulants during architectural history classes to support lectures and increase the learning capabilities of students. The authors also cover the general use...
-
Fatigue and Professional Burnout in Police Officers and Firefighters
PublikacjaExcessive demands, work overload and the working time arrangements are an important cause of burnout and fatigue in employees. Specific working time arrangements are characteristic of the internal security services, such as police officers and firefighters. This applies to both the ordering of day and night shifts and the length of shifts. Depletion of personal resources is a common component for acute fatigue and burnout. However,...
-
Radio system for monitoring and acquisition of data from traffic enforcement cameras - features and assumptions of the system
PublikacjaThe study presents the architecture and selected functional assumptions of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (RSMAD). Ultimately, the system will be used for transmission and archiving image data of traffic offenses, but can also perform other duties related to traffic safety. Implementation of the RSMAD system will facilitate, inter alia, issuing the fine process and supervision...
-
Analysis of human behavioral patterns
PublikacjaWidespread usage of Internet and mobile devices entailed growing requirements concerning security which in turn brought about development of biometric methods. However, a specially designed biometric system may infer more about users than just verifying their identity. Proper analysis of users’ characteristics may also tell much about their skills, preferences, feelings. This chapter presents biometric methods applied in several...
-
Challenges in providing support for management of evidence-based arguments
PublikacjaThe paper considers selected challenges related to the application of evidence based arguments and maps them on the tool support level. In particular, we consider: communication and teamwork, handling large arguments, evidence management and integration, argument assessment and communication, change control and reporting, evidence reuse, user data security and argument portfolio management. Then we explain how these challenges...
-
Modeling the impact of surface currents in a harbor using graph theory
PublikacjaEnsuring security in a harbor requires research into its infrastructure using spatial environmental data. This paper presents a methodology that defines the design of a graph for modeling the interactions between surface currents and moving objects. Combining this graph with port charts that integrate electronic navigation charts with coastal orthophotographs allows us to perform a multidimensional analysis. In addition, the complete...
-
RSS-Based DoA Estimation Using ESPAR Antenna for V2X Applications in 802.11p Frequency Band
PublikacjaIn this paper, we have proposed direction-of arrival (DoA) estimation of incoming signals for V2X applications in 802. 11p frequency band, based on recording of received signal strength (RSS) at electronically steerable parasitic array radiator (ESPAR) antenna's output port. The motivation of the work was to prove that ESPAR antenna used to increase connectivity and security in V2X communication can be also used for DoA estimation....
-
PHYSICAL MODELLING OF GEOTECHNICAL STRUCTURES IN PORTS AND OFFSHORE
PublikacjaThe physical modelling of subsoil behaviour and soil-structure interaction is essential for the proper design of offshore structures and port infrastructure. A brief introduction to such modelling of geoengineering problems is presented and some methods and experimental devices are described. The relationships between modelling scales are given. Some examples of penetration testing results in centrifuge and calibration chamber...
-
Physical Properties of the Noncentrosymmetric SuperconductorMg10Ir19B16
Publikacja -
The role and importance of WIMAX mobile system as a high-performance data transfer technology in wireless sensor networks for wide area monitoring applications
PublikacjaThe study discuses basic features and functional design of WiMAX Mobile system, based on the IEEE 802.16e (Release 1.5 Rev. 2.0) standard. The analysis has been made in terms of ability to use this system to transmit video stream related to monitoringof large agglomeration areas. What is more, the study includes comparison of technical parameters of WiMAX Mobile system with competitive systems such as: HSPA+ and UMTS-LTE, which...
-
A Novel Multicast Architecture of Programmable Networks
PublikacjaIn the paper a multicast architecture for programmable networks based on separation of group management and network control tasks is proposed. Thanks to this separation, services which want to make use of multicast communications no longer have to implement low-level network functionalities and their operation is greatly simplified. Abstracting service’s view of the network into a fully connected cloud enables us to transparently...
-
Cybersecurity and Privacy in Standards for Smart Grids – a Comprehensive Survey
PublikacjaResilient information and communications technologies are a prerequisite for reliable operation of smart grid. In recent years, many standards for the new form of electricity network have been proposed, which results in operators and other smart grid stakeholders having difficulties in finding the documents which can be related to their particular problems. The purpose of this paper is to bring in all smart grid standards that...
-
Multi-Stage Video Analysis Framework
PublikacjaThe chapter is organized as follows. Section 2 presents the general structure of the proposed framework and a method of data exchange between system elements. Section 3 is describing the low-level analysis modules for detection and tracking of moving objects. In Section 4 we present the object classification module. Sections 5 and 6 describe specialized modules for detection and recognition of faces and license plates, respectively....
-
Standards Conformity Framework in comparison with contemporary methods supporting standards application
PublikacjaAchieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is spent on fulfilment of safety and security requirements. However, standards application is not supported sufficiently by the tools available on the market. Therefore, Standards Conformity Framework (SCF) containing methods and tools which provide support...
-
Recognition of hazardous acoustic events employing parallel processing on a supercomputing cluster . Rozpoznawanie niebezpiecznych zdarzeń dźwiękowych z wykorzystaniem równoległego przetwarzania na klastrze superkomputerowym
PublikacjaA method for automatic recognition of hazardous acoustic events operating on a super computing cluster is introduced. The methods employed for detecting and classifying the acoustic events are outlined. The evaluation of the recognition engine is provided: both on the training set and using real-life signals. The algorithms yield sufficient performance in practical conditions to be employed in security surveillance systems. The...
-
Nanocrystalline cathode functional layer for SOFC
PublikacjaRecently, it was shown that thin functional layers introduced between an electrolyte and cathode might improve cathode performance. However, the mechanism of this improvement still needs analysis. In this paper, a thin (∼140 nm), spin-coated perovskite layer (La0.6Sr0.4Co0.2Fe0.8O3-δ) was placed between a cathode (La0.6Sr0.4Co0.2Fe0.8O3-δ) and an electrolyte (Ce0.8Gd0.2O2-δ) and the effects of this investigated. The microstructure...
-
The Physical Activity Environment Policy Index for monitoring government policies and actions to improve physical activity
PublikacjaBackground A multifaceted response, including government action, is essential to improve population levels of physical activity (PA). This article describes the development process of the ‘Physical Activity Environment Policy Index’ (PA-EPI) monitoring framework, a tool to assess government policies and actions for creating a healthy PA environment. Methods An iterative process was undertaken. This involved a review of policy...
-
On UMTS security.
PublikacjaW artykule zaprezentowano przegląd hipotetycznych ataków na sieci i systemy telekomunikacji ruchomej, w tym systemy UMTS. Uwzględniono: podsłuch, nieautoryzowany dostęp, celowe zakłócanie oraz ataki typu DoS. Zaprezentowano mechanizmy podnoszące bezpieczeństwo pracy UMTS, w szczególności wprowadzające identyfikację i ''rozwinięte'' uwierzytelnianie a także kompleksową autoryzację dostępu.
-
A history of the physical and chemical stability of pharmaceuticals : a review
Publikacja: There is a great need for a broad range review of stability tests of active pharmaceutical ingredients (APIs) in comparison with current requirements contained in the pharmacopoeia. This review focuses on a pharmaceutical history of physical and chemical stability determination. Traditional knowledge must be considered in the context of physical stability, while new knowledge must be applied and acquired in terms of identification...
-
Electrocatalytic gas sensor with reference layer
PublikacjaIn recent years electrochemical gas sensors based on solid state electrolytes have been intensively developed. They are easy to obtain, use and relative durable. Nasicon is one of the most promising materials, which have been used in construction of gas sensors. Most of these devices work in potentiometric or amperometric mode. However, some works are dedicated to sensors working in electrocatalytic mode. Principle of operation...
-
Vibrations in Physical Systems
Czasopisma -
Framework for RIDM within functional safety management process
PublikacjaThe functional safety management in life cycle is a complex process starting with identifying hazards and defining safety-related functions (SRFs) with risk assessment oriented at determining the safety integrity level. Another element of such life cycle is a verification of required SIL for designed safety-related system which implements safety function. Due to complexity of the problem, to overcome difficulties in safety-related...
-
Automatic Analysis of Trajectories of Moving Objects
PublikacjaOngoing monitoring is essential to providing security and safety of maritime and air operations. This paper presents the research in the area of automatic analysis of movement of unrestricted vehicles like ships and air-planes. The analysis is aimed at extraction of trajectory information, and the results can be used to identify anomalous behaviour in archived and real-time data. In this paper we focus on data acquired using the...
-
An Approach to the Detection of Bank Robbery Acts Employing Thermal Image Analysis
PublikacjaA novel approach to the detection of selected security-related events in bank monitoring systems is presented. Thermal camera images are used for the detection of people in difficult lighting conditions. Next, the algorithm analyses movement of objects detected in thermal or standard monitoring cameras using a method evolved from the motion history images algorithm. At the same time, thermal images are analyzed in order to detect...
-
Public spaces connecting cities. Green and Blue Infrastructures potential.
PublikacjaA city fragmentation causes a lot of negative effects in urban environment such as: disconnecting the environmental, functional and compositional relations, a loss of urban compactness, chaotic development, visual chaos, a domination of technical landscape, reduction of security. This is why one of main challenges for urban planners is to connect the fragmented structures by creating friendly, attractive and safe public space....
-
VISUALIZATION OF SCANTER AND ARPA RADAR DATA IN THE DISTRIBUTED TELEINFORMATION SYSTEM FOR THE BORDER GUARD
PublikacjaMonitoring of country maritime border is an important task of the Border Guard. This activity can be enhanced with the use of the technology enabling gathering information from distributed sources, processing of that information and its visualization. The paper presents the next stage of development of the STRADAR project (Streaming of real-time data transmission in distributed dispatching and teleinformation systems of the Border...
-
Jacek Czub prof. dr hab. inż.
Osoby -
Internal Security
Czasopisma -
Edible black ant Smith (Carebara vidua) as human food – A systematic review
PublikacjaMeeting food security is one of the major global challenges to ensure sufficient supply of food for current and future generations, considering increasing population growth and climate change issues. Consequently, the consumption of edible insects as an alternative food source has recently gained global attention for combating global food insecurity. The present review aims to provide information on the recent progress in consumption...
-
Layer-by-layer polymer deposited fabrics with superior flame retardancy and electrical conductivity
PublikacjaSmart and multifunctional textiles and fabrics are progressively developing, such that multifunctional fabrics are becoming more widespread. We elaborated herein multi-layered flax fabrics with superior flame retardancy and conductivity, which revealed fireproof feature while keeping conductivity during burning. The flax fabric was reinforced by layer-by-layer (LbL) deposition of sodium polyacrylate (SPA), polyethylenimine (PEI),...
-
Studies on the influence of β-cyclodextrin derivatives on the physical stability of famotidine
PublikacjaThe usage of Fourier transform infrared spectroscopy, near infrared spectroscopy, differential scanning calorimetry and microscopy is presented in this work focused on the exploration of the effect of CD on the physical stability of famotidine (FAM). The most significant information was achieved by analysis of the second derivatives ofnear infrared (NIR) spectra recorded. Changes in the shape of spectra derivatives allow...
-
A framework for automatic detection of abandoned luggage in airport terminal
PublikacjaA framework for automatic detection of events in a video stream transmitted from a monitoring system is presented. The framework is based on the widely used background subtraction and object tracking algorithms. The authors elaborated an algorithm for detection of left and removed objects based on mor-phological processing and edge detection. The event detection algorithm collects and analyzes data of all the moving objects in...
-
Political Parties in the Digital World
PublikacjaThe aim of this report is to outline how digital technologies and digital media are redefining the way political parties fulfill their role as collective platforms for political participation of citizens, e.g. in relation to the parties’ decision-making processes, communication strategies, funding mechanisms, membership, information sharing, etc. and to highlight the existing international standards and good practices in this area....
-
Nuclear power plant as a source of electrical energy and heat
PublikacjaIn this paper certain issues concerning usage of nuclear power plants as sources of not only electric power but also thermal energy will be discussed. For such a solution appeals most of all the need to limit harmful emissions of gases (including CO2) and ashes, which come from the process of burning fossil fuels, as well as the raising demand for network heat and chill. Additionally combined heat and power production brings measurable...
-
Expert assessment of arguments: a method and its experimental evaluation
PublikacjaArgument structures are commonly used to develop and present cases for safety, security and other properties. Such argument structures tend to grow excessively. To deal with this problem, appropriate methods of their assessment are required. Two objectives are of particular interest: (1) systematic and explicit assessment of the compelling power of an argument, and (2) communication of the result of such an assessment to relevant...
-
Bezpieczeństwo w IP Multimedia Subsystem
PublikacjaAbstrakt Artykuł jest trzecim w cyklu prac poświęconych IP Multimedia Subsystem (IMS) - po przedstawieniu architektury i usług IMS, odpowiednio w zeszytach 12/2009 oraz 2-3/2011 Przeglądu Telekomunikacyjnego i Wiadomości Telekomunikacyjnych. W obecnym artykule przedstawiono sposoby zapewnienia bezpieczeństwa przy realizacji tych usług.Artykuł został podzielony został na trzy części w których omówiono ogólne wyzwania bezpieczeństwa...
-
Eye-Gaze Tracking-Based Telepresence System for Videoconferencing
PublikacjaAn approach to the teleimmersive videoconferencing system enhanced by the pan-tilt-zoom (PTZ) camera, controlled by the eye-gaze tracking system, is presented in this paper. An overview of the existing telepresence systems, especially dedicated to videoconferencing is included. The presented approach is based on the CyberEye eye-gaze tracking system engineered at the Multimedia Systems Department (MSD) of Gdańsk University of Technology...
-
Supporting Cybersecurity Compliance Assessment of Industrial Automation and Control System Components
PublikacjaThe chapter presents a case study demonstrating how security requirements of an Industrial Automation and Control System (IACS) component can be represented in a form of Protection Profile that is based on IEC 62443 standards and how compliance assessment of such component can be supported by explicitly representing a conformity argument in a form based on the OMG SACM meta-model. It is also demonstrated how an advanced argument...
-
In Situ Verification of Numerical Model of Water Hammer in Slurries
PublikacjaThis paper presents a numerical model of transient flow in a pressure slurry pipeline network with verification based on in situ measurements. The model, primarily verified in laboratory conditions, has been extended and applied to the case of a large and complex slurry pipeline network in Poland. In the model, the equivalent density concept was applied. In situ experiments were performed for various unsteady flow episodes, caused by...
-
Bezpieczny Pracownik w Cyberprzestrzeni – Security Awareness
Kursy Online -
Physical properties of the noncentrosymmetric superconductor Mg10Ir19B16
PublikacjaPrzedstawione zostały wyniki pomiarów ciepła właściwego, oporu elektrycznego i podatności magnetycznej nowo odkrytego materiału nadprzewodzącego Mg10Ir19B16. Na podstawie pomiarów ustalono, że Mg10Ir19B16 jest nadprzewodnikiem drugiego typu (kappa=20), ze stałą sprzężenia elektron - fonon lambda_ep=0.66.
-
Low-dimensional bound entanglement with one-way distillable cryptographic key
PublikacjaIn this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...
-
Support for argument structures review and assessment
PublikacjaArgument structures are commonly used to develop and present cases for safety, security and for other properties of systems. Such structures tend to grow excessively, which causes problems with their review and assessment. Two issues are of particular interest: (1) systematic and explicit assessment of the compelling power of an argument, and (2) communication of the result of such an assessment to relevant recipients. The paper...
-
E-Voting System Evaluation Based on the Council of Europe Recommendations: nVotes
PublikacjaE-voting implantation has been facing important challenges in recent years. Several incidents, together with a lack of evaluation methodologies social and cultural customs hinder a broader application. In this work, the authors aim to contribute to a safer introduction of e-voting tools by applying a practical evaluation framework strongly based on the security requirements issued by the Council of Europe (CoE) in 2017 to nvotes,...
-
A survey of neural networks usage for intrusion detection systems
PublikacjaIn recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...
-
Using EO satellite data in Safe City and Coastal Zone web-GIS
PublikacjaThe paper presents a novel design of a web-based Safe City & Coastal Zone GIS (SCCZ-GIS) which integrates data acquired from different remote sensing and geospatial data sources for monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilizes several innovative technologies and directly co-operates with different remote sensing data sources and services, like a satellite ground station...
-
Hedging Strategies of Derivatives Instruments for Commodity Trading Entities
PublikacjaHedging as an outcome of risk management arises to account several questions. Mentioned aspect of size of the hedging is one of them. Latter questioning refers to whether producer of manufacturer are willing to secure entire exposure, when the hedging should start, now or later in the future, what is the vision on market like direction of market, time of interest, magnitude of exposure, what would be the preferred instruments of...
-
Application of the Regional Security Complex Theory for Security Analysis in the Persian Gulf
Publikacja -
Characteristics of La0.8Sr0.2Ga0.8Mg0.2O3-delta -supported micro-tubular solid oxide fuel cells with bi-layer and tri-layer electrolytes
PublikacjaIn this study, La0.8Sr0.2Ga0.8Mg0.2O3−δ (LSGM)-supported micro tubular solid oxide fuel cells (T-SOFCs) with two different configurations, one containing an LSGM–Ce0.6La0.4O2−δ (LDC) bi-layer electrolyte (Cell A) and one containing an LDC–LSGM–LDC tri-layer electrolyte (Cell B), were fabricated using extrusion and dip-coating. After optimizing the paste formulation for extrusion, the flexural strength of the dense and uniform LSGM...