Wyniki wyszukiwania dla: information security - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: information security

Wyniki wyszukiwania dla: information security

  • Spatial Modelling in Environmental Analysis and Civil Engineering

    As can be seen, Spatial Modelling in Environmental Analysis and Civil Engineering applies to a multitude of applications. In an attempt to bring the topic closer to potential readers, the special issue referred to security methods, optimization of calculations, conducting measurements and empirical tests. Each article has made an original contribution to the development of practical science that can be replicated by researchers...

    Pełny tekst do pobrania w portalu

  • Software modules and application layer's security structure of RSMAD

    The paper discusses the software modules of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD). The structure of the application layer of the system has also been analysed in details, including: purpose, structure and principles of operation of software modules constituting this system. In addition, the paper presents and discusses the structure of security of application layer...

  • Improvement of subsoil and railway substructure by explosive means.

    Publikacja

    Quick and effective method of subsoil and railway substructure improvement by using explosive means (registered trade name: microblasting) allowes design and construct railways on lowered bearing soils (i.e. wetlands, marshlands, industrial by-products, municipal wastes, degraded antropogenic embankments). It is usefull and recommendable technology to construct new railways, modernization or maintenance and repairing of old ones...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Multichannel Human Body Communication

    Publikacja

    Human Body Communication is an attractive alternative for traditional wireless communication (Bluetooth, ZigBee) in case of Body Sensor Networks. Low power, high data rates and data security makes it ideal solution for medical applications. In this paper, signal attenuation for different frequencies, using FR4 electrodes, has been investigated. Performance of single and multichannel transmission with frequency modulation of analog...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • RUSSIANS ON THE POLISH LABOUR MARKET

    The article looks into the employment of Russian citizens in Poland in 2004– 2018. It presents the legal basis for Russians’ entering Poland and taking up work without having to seek a work permit, and specifies who must apply for such a permit. Russian citizens can obtain refugee status under the Geneva Convention, which grants them the right to move freely, choose their place of residence and undertake paid employment, while...

    Pełny tekst do pobrania w portalu

  • Incorporating Iris, Fingerprint and Face Biometric for Fraud Prevention in e-Passports Using Fuzzy Vault

    Publikacja

    - IET Image Processing - Rok 2019

    A unified frame work which provides a higher security level to e-passports is proposed. This framework integrates face, iris and fingerprint images. It involves three layers of security: the first layer maps a biometric image to another biometric image which is called biostego image. Three mapping schemes are proposed: the first scheme maps single biometric image to single biostego image, the second scheme maps dual biometric images...

    Pełny tekst do pobrania w portalu

  • Multisensor System for the Protection of Critical Infrastructure of Seaport

    Publikacja
    • M. Kastek
    • R. Dulski
    • M. Życzkowski
    • M. Szustakowski
    • P. Trzaskawka
    • W. Ciurapiński
    • P. Markowski
    • M. Karol
    • G. Grelowska
    • I. Gloza... i 2 innych

    - Rok 2013

    There are many separated infrastructural objects within a harbor area that may be considered “critical”, such as gas and oil terminals or anchored naval vessels. Those objects require special protection, including security systems capable of monitoring both surface and underwater areas, because an intrusion into the protected area may be attempted using small surface vehicles (boats, kayaks, rafts, floating devices with weapons...

  • Anonymity Architecture for Mobile Agent Systems

    Publikacja

    - Rok 2007

    The paper presents a new security architecture for MAS, which supports anonymity of agent owners. The architecture is composed of two main elements: Module I: Untraceability Protocol Infrastructure and Module II: Additional Untraceability Support. Module I is based on the recently proposed untraceability protocol for MAS and it forms the core of the anonymity architecture, which can be supported by the ele- ments of the second...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Moving object detection and tracking for the purpose of multimodal surveillance system in urban areas

    Publikacja

    - Rok 2008

    Background subtraction method based on mixture of Gaussians was employed to detect all regions in a video frame denoting moving objects. Kalman filters were used for establishing relations between the regions and real moving objects in a scene and for tracking them continuously. The objects were represented by rectangles. The objects coupling with adequate regions including the relation of many-to-many was studied experimentally...

  • Analysis and comparision of safety of children and adult passanger in car based on crash tests results

    Publikacja

    This paper presents analysis and comparision of safety of children and adult passanger in car based on crash tests results. The car crash test with four dummies, including two car seats allowed a direct comparison of the security under the same conditions of children and passengers directly to the car seat. Analysis of acceleration and video from the test allows to understand the phenomena during the collision, the air bags influence,...

  • Implementation of the Concept of Flexicurity in the Selected Countries of Central Eastern Europe

    Publikacja

    The CEE countries have to create their own flexicurity policies which would take into account the employment policy guidelines, cultural traditions and socio-economic development. The aim of this article is to examine and evaluate the implementation of the flexicurity concept on the basis of the adopted set of composite indicators. The study covers 9 countries of the CEE region, and the research period covers the years 2007 and 2013....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Identification of Emotional States Using Phantom Miro M310 Camera

    Publikacja

    The purpose of this paper is to present the possibilities associated with the use of remote sensing methods in identifying human emotional states, and to present the results of the research conducted by the authors in this field. The studies presented involved the use of advanced image analysis to identify areas on the human face that change their activity along with emotional expression. Most of the research carried out in laboratories...

  • Założenia modelu zarządzania kryzysowego bezpieczeństwem w portach morskich

    Publikacja

    Złożoność przestrzenna i gospodarcza oraz silne oddziaływanie działalności portowej na procesy społeczno-gospodarcze w regionie, wymaga opracowania specjalnego podejścia do zarządzania bezpieczeństwem na obszarach portowych. W pracy przedstawiono założenia modelu zarządzania kryzysowego bezpieczeństwem w portach morskich uwzględniające zasady międzynarodowego kodeksu ISPS (International Ship and Port Security Code) oraz wymagania...

  • Uncertainty assessment in the safety and security oriented risk analyses

    Publikacja

    - Rok 2006

    W artykule przedstawiono uwzględnienie oceny niepewności w procesie związanym z analizą ryzyka i analizą bezpieczeństwa oraz ochroną informacji. Przedstawiona została koncepcja oceny bezpieczeństwa i zarządzania ryzykiem z uwzględnieniem analizy warstw zabezpieczeń LOPA. W artykule nakreślono wyzwania związane z integracją podejścia oceny bezpieczeństwa (safety) i ochrony informacji (security) w projektowaniu systemów zabezpieczeń...

  • Wykorzystanie programu AutoFocus do analizy protokołów kryptograficznych

    AutoFocus jest narzędziem wspomagającym wytwarzanie systemów wbudowanych charakteryzujących się wysoką niezawodnością. Artykuł prezentuje studium przypadku zastosowania narzędzia i związanej z nim metody formalnej Focus do analizy bezpieczeństwa (ang. security) protokołu tworzenia podpisu cyfrowego w środowisku rozproszonym. Zastosowana metoda formalna wykorzystana została jako ostatni etap zintegrowanej metody oceny protokołów...

  • Radiokomunikacja morska - problemy eksploatacyjne i rozwój

    Publikacja

    - Rok 2006

    W pracy omówiono stan obecny oraz wynikające z tego problemy eksploatacyjne występujące w radiokomunikacji morskiej, ze szczególnym odniesieniem do zagadnień związanych z bezpieczeństwem pracy na morzu. Scharakteryzowano kierunki rozwoju w obszarach głównych podsystemów składowych tej dziedziny łączności radiowej. Poruszono także coraz bardziej aktualny problem zastosowania systemów łączności dla potrzeb ochrony żeglugi (maritime...

  • Methods of deep modification of low-bearing soil for the foundation of new and spare air runways

    After analyzing the impact of aircraft on the airport pavement (parking spaces, runways, startways), it was considered advisable to consider the problem of deep improvement or strengthening of its subsoil. This is especially true for low-bearing soil. The paper presents a quick and effective method of strengthening the subsoil intended for the construction of engineering structures used for civil...

    Pełny tekst do pobrania w portalu

  • RSS-Based DoA Estimation Using ESPAR Antenna for V2X Applications in 802.11p Frequency Band

    Publikacja

    In this paper, we have proposed direction-of arrival (DoA) estimation of incoming signals for V2X applications in 802. 11p frequency band, based on recording of received signal strength (RSS) at electronically steerable parasitic array radiator (ESPAR) antenna's output port. The motivation of the work was to prove that ESPAR antenna used to increase connectivity and security in V2X communication can be also used for DoA estimation....

    Pełny tekst do pobrania w portalu

  • Multimedia Communications, Services and Security MCSS. 10th International Conference, MCSS 2020, Preface

    Publikacja

    - Rok 2020

    Multimedia surrounds us everywhere. It is estimated that only a part of the recorded resources are processed and analyzed. These resources offer enormous opportunities to improve the quality of life of citizens. As a result, of the introduction of a new type of algorithms to improve security by maintaining a high level of privacy protection. Among the many articles, there are examples of solutions for improving the operation of...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Radio system for monitoring and acquisition of data from traffic enforcement cameras - features and assumptions of the system

    The study presents the architecture and selected functional assumptions of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (RSMAD). Ultimately, the system will be used for transmission and archiving image data of traffic offenses, but can also perform other duties related to traffic safety. Implementation of the RSMAD system will facilitate, inter alia, issuing the fine process and supervision...

  • Benchmarking Scalability and Security Configuration Impact for A Distributed Sensors-Server IOT Use Case

    Publikacja

    - Rok 2021

    Internet of Things has been getting more and more attention and found numerous practical applications. Especially important in this context are performance, security and ability to cope with failures. Especially crucial is to find good trade-off between these. In this article we present results of practical tests with multiple clients representing sensors sending notifications to an IoT middleware – DeviceHive. We investigate performance...

    Pełny tekst do pobrania w portalu

  • Mini-Cave Automatic Virtual Environment Application in Security, Safety, and Defence Studies

    Publikacja

    - Rok 2021

    The aim of the article is to analyse the use of mini-Cave Automatic Virtual Reality Environment (mini-CAVE) in academic studies on security, safety, and defence. The literature review based on Web of Science database and the case study of the War Studies University research activities indicated the mini-CAVE can be used in two areas as a research infrastructure and as a didactic tool. It can be concluded that due to the development...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Analysis of human behavioral patterns

    Publikacja

    - Rok 2022

    Widespread usage of Internet and mobile devices entailed growing requirements concerning security which in turn brought about development of biometric methods. However, a specially designed biometric system may infer more about users than just verifying their identity. Proper analysis of users’ characteristics may also tell much about their skills, preferences, feelings. This chapter presents biometric methods applied in several...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Challenges in providing support for management of evidence-based arguments

    The paper considers selected challenges related to the application of evidence based arguments and maps them on the tool support level. In particular, we consider: communication and teamwork, handling large arguments, evidence management and integration, argument assessment and communication, change control and reporting, evidence reuse, user data security and argument portfolio management. Then we explain how these challenges...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The role and importance of WIMAX mobile system as a high-performance data transfer technology in wireless sensor networks for wide area monitoring applications

    Publikacja

    - Logistyka - Rok 2010

    The study discuses basic features and functional design of WiMAX Mobile system, based on the IEEE 802.16e (Release 1.5 Rev. 2.0) standard. The analysis has been made in terms of ability to use this system to transmit video stream related to monitoringof large agglomeration areas. What is more, the study includes comparison of technical parameters of WiMAX Mobile system with competitive systems such as: HSPA+ and UMTS-LTE, which...

  • Multi-Stage Video Analysis Framework

    The chapter is organized as follows. Section 2 presents the general structure of the proposed framework and a method of data exchange between system elements. Section 3 is describing the low-level analysis modules for detection and tracking of moving objects. In Section 4 we present the object classification module. Sections 5 and 6 describe specialized modules for detection and recognition of faces and license plates, respectively....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Standards Conformity Framework in comparison with contemporary methods supporting standards application

    Publikacja

    - Rok 2008

    Achieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is spent on fulfilment of safety and security requirements. However, standards application is not supported sufficiently by the tools available on the market. Therefore, Standards Conformity Framework (SCF) containing methods and tools which provide support...

  • Supporting Compliance with Security Standards by Trust Case Templates

    Publikacja

    - Rok 2007

    Trust Cases are used to justify that a given object (a system, an infrastructure, an organization) exhibits certain properties. One of possible applications of trust cases is related to the processes of achieving and demonstrating the compliance with standards. A Trust Case Template derived from a given standard constitutes a skeleton of justification (encompassing evidence and argumentation) of the compliance with the standard....

  • A Novel Multicast Architecture of Programmable Networks

    Publikacja

    - Rok 2015

    In the paper a multicast architecture for programmable networks based on separation of group management and network control tasks is proposed. Thanks to this separation, services which want to make use of multicast communications no longer have to implement low-level network functionalities and their operation is greatly simplified. Abstracting service’s view of the network into a fully connected cloud enables us to transparently...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Recognition of hazardous acoustic events employing parallel processing on a supercomputing cluster . Rozpoznawanie niebezpiecznych zdarzeń dźwiękowych z wykorzystaniem równoległego przetwarzania na klastrze superkomputerowym

    Publikacja

    A method for automatic recognition of hazardous acoustic events operating on a super computing cluster is introduced. The methods employed for detecting and classifying the acoustic events are outlined. The evaluation of the recognition engine is provided: both on the training set and using real-life signals. The algorithms yield sufficient performance in practical conditions to be employed in security surveillance systems. The...

  • Anti-theft lab security system based on RFID

    The aim of the project is to design and create an electronic system, which can be used to protect laboratory equipment against theft. The main task of the system is to warn a person responsible for the facilities about any attempts made to steal equipment from a laboratory. In a case of an alarm situation, the system emits a sound signal. The concept of the anti-theft security system based on RFID was developed on the basis of...

    Pełny tekst do pobrania w portalu

  • Framework for RIDM within functional safety management process

    The functional safety management in life cycle is a complex process starting with identifying hazards and defining safety-related functions (SRFs) with risk assessment oriented at determining the safety integrity level. Another element of such life cycle is a verification of required SIL for designed safety-related system which implements safety function. Due to complexity of the problem, to overcome difficulties in safety-related...

  • Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues

    Management of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...

  • An Approach to the Detection of Bank Robbery Acts Employing Thermal Image Analysis

    Publikacja

    - Rok 2013

    A novel approach to the detection of selected security-related events in bank monitoring systems is presented. Thermal camera images are used for the detection of people in difficult lighting conditions. Next, the algorithm analyses movement of objects detected in thermal or standard monitoring cameras using a method evolved from the motion history images algorithm. At the same time, thermal images are analyzed in order to detect...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Public spaces connecting cities. Green and Blue Infrastructures potential.

    Publikacja

    A city fragmentation causes a lot of negative effects in urban environment such as: disconnecting the environmental, functional and compositional relations, a loss of urban compactness, chaotic development, visual chaos, a domination of technical landscape, reduction of security. This is why one of main challenges for urban planners is to connect the fragmented structures by creating friendly, attractive and safe public space....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios

    Publikacja

    - IEEE Access - Rok 2020

    During and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...

    Pełny tekst do pobrania w portalu

  • In Situ Verification of Numerical Model of Water Hammer in Slurries

    Publikacja

    This paper presents a numerical model of transient flow in a pressure slurry pipeline network with verification based on in situ measurements. The model, primarily verified in laboratory conditions, has been extended and applied to the case of a large and complex slurry pipeline network in Poland. In the model, the equivalent density concept was applied. In situ experiments were performed for various unsteady flow episodes, caused by...

    Pełny tekst do pobrania w portalu

  • A framework for automatic detection of abandoned luggage in airport terminal

    Publikacja

    A framework for automatic detection of events in a video stream transmitted from a monitoring system is presented. The framework is based on the widely used background subtraction and object tracking algorithms. The authors elaborated an algorithm for detection of left and removed objects based on mor-phological processing and edge detection. The event detection algorithm collects and analyzes data of all the moving objects in...

  • Nuclear power plant as a source of electrical energy and heat

    In this paper certain issues concerning usage of nuclear power plants as sources of not only electric power but also thermal energy will be discussed. For such a solution appeals most of all the need to limit harmful emissions of gases (including CO2) and ashes, which come from the process of burning fossil fuels, as well as the raising demand for network heat and chill. Additionally combined heat and power production brings measurable...

  • Expert assessment of arguments: a method and its experimental evaluation

    Publikacja

    - Rok 2008

    Argument structures are commonly used to develop and present cases for safety, security and other properties. Such argument structures tend to grow excessively. To deal with this problem, appropriate methods of their assessment are required. Two objectives are of particular interest: (1) systematic and explicit assessment of the compelling power of an argument, and (2) communication of the result of such an assessment to relevant...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Automatic sound recognition for security purposes

    Publikacja

    - Rok 2008

    In the paper an automatic sound recognition system is presented. It forms a part of a bigger security system developed in order to monitor outdoor places for non-typical audio-visual events. The analyzed audio signal is being recorded from a microphone mounted in an outdoor place thus a non stationary noise of a significant energy is present in it. In the paper an especially designed algorithm for outdoor noise reduction is presented,...

  • Bezpieczeństwo w IP Multimedia Subsystem

    Abstrakt Artykuł jest trzecim w cyklu prac poświęconych IP Multimedia Subsystem (IMS) - po przedstawieniu architektury i usług IMS, odpowiednio w zeszytach 12/2009 oraz 2-3/2011 Przeglądu Telekomunikacyjnego i Wiadomości Telekomunikacyjnych. W obecnym artykule przedstawiono sposoby zapewnienia bezpieczeństwa przy realizacji tych usług.Artykuł został podzielony został na trzy części w których omówiono ogólne wyzwania bezpieczeństwa...

  • Eye-Gaze Tracking-Based Telepresence System for Videoconferencing

    An approach to the teleimmersive videoconferencing system enhanced by the pan-tilt-zoom (PTZ) camera, controlled by the eye-gaze tracking system, is presented in this paper. An overview of the existing telepresence systems, especially dedicated to videoconferencing is included. The presented approach is based on the CyberEye eye-gaze tracking system engineered at the Multimedia Systems Department (MSD) of Gdańsk University of Technology...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Supporting Cybersecurity Compliance Assessment of Industrial Automation and Control System Components

    Publikacja

    The chapter presents a case study demonstrating how security requirements of an Industrial Automation and Control System (IACS) component can be represented in a form of Protection Profile that is based on IEC 62443 standards and how compliance assessment of such component can be supported by explicitly representing a conformity argument in a form based on the OMG SACM meta-model. It is also demonstrated how an advanced argument...

    Pełny tekst do pobrania w portalu

  • A survey of neural networks usage for intrusion detection systems

    In recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...

    Pełny tekst do pobrania w portalu

  • PUBLIC SOURCES OF FINANCE FOR CULTURE AS AN ELEMENT OF CULTURAL SECURITY IN POLAND

    Publikacja

    - Rok 2016

    Culture is an important element of the country, playing an important role both for its security and the economy. It cannot be only seen as a cost-creating sector, but may be a significant factor in economic development. For this to happen, it is necessary to create a system of financing this economic sector. This article’s aim is to analyze the use of funds from public sources in Poland to finance culture-related activities. The...

    Pełny tekst do pobrania w portalu

  • Support for argument structures review and assessment

    Argument structures are commonly used to develop and present cases for safety, security and for other properties of systems. Such structures tend to grow excessively, which causes problems with their review and assessment. Two issues are of particular interest: (1) systematic and explicit assessment of the compelling power of an argument, and (2) communication of the result of such an assessment to relevant recipients. The paper...

    Pełny tekst do pobrania w portalu

  • Using EO satellite data in Safe City and Coastal Zone web-GIS

    The paper presents a novel design of a web-based Safe City & Coastal Zone GIS (SCCZ-GIS) which integrates data acquired from different remote sensing and geospatial data sources for monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilizes several innovative technologies and directly co-operates with different remote sensing data sources and services, like a satellite ground station...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Hedging Strategies of Derivatives Instruments for Commodity Trading Entities

    Publikacja

    - Rok 2015

    Hedging as an outcome of risk management arises to account several questions. Mentioned aspect of size of the hedging is one of them. Latter questioning refers to whether producer of manufacturer are willing to secure entire exposure, when the hedging should start, now or later in the future, what is the vision on market like direction of market, time of interest, magnitude of exposure, what would be the preferred instruments of...

  • I, Robot: between angel and evil

    Publikacja

    - Rok 2020

    The boosting of most digital innovations within recent technology progress by artificial intelligence (AI) constitutes a growing topic of interest. Besides its technical aspects, increasing research activity may be observed in the domain of security challenges, and therefore of responsibility related to the controlled or hypothetically uncontrolled or autonomous emergence of AI solutions. Consequently, responsibility and ethics...

    Pełny tekst do pobrania w serwisie zewnętrznym