Wyniki wyszukiwania dla: COST OF INFORMATION SECURITY - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: COST OF INFORMATION SECURITY

Wyniki wyszukiwania dla: COST OF INFORMATION SECURITY

  • Methods of deep modification of low-bearing soil for the foundation of new and spare air runways

    After analyzing the impact of aircraft on the airport pavement (parking spaces, runways, startways), it was considered advisable to consider the problem of deep improvement or strengthening of its subsoil. This is especially true for low-bearing soil. The paper presents a quick and effective method of strengthening the subsoil intended for the construction of engineering structures used for civil...

    Pełny tekst do pobrania w portalu

  • Fatigue and Professional Burnout in Police Officers and Firefighters

    Publikacja

    - Internal Security - Rok 2012

    Excessive demands, work overload and the working time arrangements are an important cause of burnout and fatigue in employees. Specific working time arrangements are characteristic of the internal security services, such as police officers and firefighters. This applies to both the ordering of day and night shifts and the length of shifts. Depletion of personal resources is a common component for acute fatigue and burnout. However,...

    Pełny tekst do pobrania w portalu

  • Journal of Benefit-Cost Analysis

    Czasopisma

    ISSN: 2152-2812

  • Cost Effectiveness and Resource Allocation

    Czasopisma

    ISSN: 1478-7547

  • Disciplines and measures of information resilience

    Publikacja
    • J. Rak
    • M. Jonsson
    • D. Hutchison
    • J. Sterbenz

    - Rok 2017

    Communication networks have become a fundamental part of many critical infrastructures, playing an important role in information delivery in various failure scenarios triggered e.g., by forces of nature (including earthquakes, tornados, fires, etc.), technology-related disasters (for instance due to power blackout), or malicious human activities. A number of recovery schemes have been defined in the context of network resilience...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • RSS-Based DoA Estimation Using ESPAR Antenna for V2X Applications in 802.11p Frequency Band

    Publikacja

    In this paper, we have proposed direction-of arrival (DoA) estimation of incoming signals for V2X applications in 802. 11p frequency band, based on recording of received signal strength (RSS) at electronically steerable parasitic array radiator (ESPAR) antenna's output port. The motivation of the work was to prove that ESPAR antenna used to increase connectivity and security in V2X communication can...

    Pełny tekst do pobrania w portalu

  • Radio system for monitoring and acquisition of data from traffic enforcement cameras - features and assumptions of the system

    The study presents the architecture and selected functional assumptions of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (RSMAD). Ultimately, the system will be used for transmission and archiving image data of traffic offenses, but can also perform other duties related to traffic safety. Implementation of the RSMAD system will facilitate, inter alia, issuing the fine process and supervision...

  • Challenges in providing support for management of evidence-based arguments

    The paper considers selected challenges related to the application of evidence based arguments and maps them on the tool support level. In particular, we consider: communication and teamwork, handling large arguments, evidence management and integration, argument assessment and communication, change control and reporting, evidence reuse, user data security and argument portfolio management. Then we explain how these challenges...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • RSS-Based DoA Estimation Using ESPAR Antenna for V2X Applications in 802.11p Frequency Band

    Publikacja

    In this paper, we have proposed direction-of arrival (DoA) estimation of incoming signals for V2X applications in 802. 11p frequency band, based on recording of received signal strength (RSS) at electronically steerable parasitic array radiator (ESPAR) antenna's output port. The motivation of the work was to prove that ESPAR antenna used to increase connectivity and security in V2X communication can be also used for DoA estimation....

    Pełny tekst do pobrania w portalu

  • Analysis of human behavioral patterns

    Publikacja

    - Rok 2022

    Widespread usage of Internet and mobile devices entailed growing requirements concerning security which in turn brought about development of biometric methods. However, a specially designed biometric system may infer more about users than just verifying their identity. Proper analysis of users’ characteristics may also tell much about their skills, preferences, feelings. This chapter presents biometric methods applied in several...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Quantum security and theory of decoherence

    Publikacja

    We sketch a relation between two crucial, yet independent, fields in quantum information research, viz. quantum decoherence and quantum cryptography. We investigate here how the standard cryptographic assumption of shielded laboratory, stating that data generated by a secure quantum device remain private unless explicitly published, is disturbed by the einselection mechanism of quantum Darwinism explaining the measurement process...

    Pełny tekst do pobrania w portalu

  • Library Information Skills - Level 1

    Kursy Online
    • A. Jaroszuk-Antoniewska
    • A. Szymik

    The Gdańsk Tech Library offers Library Information Skills e-course to the students enrolled in English-language degree programmes at Gdańsk University of Technology (Gdańsk Tech). It is an obligatory course. There is a test at the end of the e-course. Information skills, or in other words information literacy, means knowing what kind of information a student is looking for, where to find it, how to evaluate, communicate and use...

  • The role and importance of WIMAX mobile system as a high-performance data transfer technology in wireless sensor networks for wide area monitoring applications

    Publikacja

    - Logistyka - Rok 2010

    The study discuses basic features and functional design of WiMAX Mobile system, based on the IEEE 802.16e (Release 1.5 Rev. 2.0) standard. The analysis has been made in terms of ability to use this system to transmit video stream related to monitoringof large agglomeration areas. What is more, the study includes comparison of technical parameters of WiMAX Mobile system with competitive systems such as: HSPA+ and UMTS-LTE, which...

  • Standards Conformity Framework in comparison with contemporary methods supporting standards application

    Publikacja

    - Rok 2008

    Achieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is spent on fulfilment of safety and security requirements. However, standards application is not supported sufficiently by the tools available on the market. Therefore, Standards Conformity Framework (SCF) containing methods and tools which provide support...

  • A Novel Multicast Architecture of Programmable Networks

    Publikacja

    - Rok 2015

    In the paper a multicast architecture for programmable networks based on separation of group management and network control tasks is proposed. Thanks to this separation, services which want to make use of multicast communications no longer have to implement low-level network functionalities and their operation is greatly simplified. Abstracting service’s view of the network into a fully connected cloud enables us to transparently...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Multi-Stage Video Analysis Framework

    The chapter is organized as follows. Section 2 presents the general structure of the proposed framework and a method of data exchange between system elements. Section 3 is describing the low-level analysis modules for detection and tracking of moving objects. In Section 4 we present the object classification module. Sections 5 and 6 describe specialized modules for detection and recognition of faces and license plates, respectively....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Recognition of hazardous acoustic events employing parallel processing on a supercomputing cluster . Rozpoznawanie niebezpiecznych zdarzeń dźwiękowych z wykorzystaniem równoległego przetwarzania na klastrze superkomputerowym

    Publikacja

    A method for automatic recognition of hazardous acoustic events operating on a super computing cluster is introduced. The methods employed for detecting and classifying the acoustic events are outlined. The evaluation of the recognition engine is provided: both on the training set and using real-life signals. The algorithms yield sufficient performance in practical conditions to be employed in security surveillance systems. The...

  • Superadditivity of two quantum information resources

    Publikacja

    - Science Advances - Rok 2017

    Entanglement is one of the most puzzling features of quantum theory and a principal resource for quantum information processing. It is well known that in classical information theory, the addition of two classical information resources will not lead to any extra advantages. On the contrary, in quantum information, a spectacular phenomenon of the superadditivity of two quantum information resources emerges. It shows that quantum...

    Pełny tekst do pobrania w portalu

  • On UMTS security.

    Publikacja

    - Rok 2004

    W artykule zaprezentowano przegląd hipotetycznych ataków na sieci i systemy telekomunikacji ruchomej, w tym systemy UMTS. Uwzględniono: podsłuch, nieautoryzowany dostęp, celowe zakłócanie oraz ataki typu DoS. Zaprezentowano mechanizmy podnoszące bezpieczeństwo pracy UMTS, w szczególności wprowadzające identyfikację i ''rozwinięte'' uwierzytelnianie a także kompleksową autoryzację dostępu.

  • Marcin Sikorski prof. dr hab. inż.

    Marcin Sikorski jest profesorem w Katedrze Informatyki w Zarządzaniu na Wydziale Zarządzania i Ekonomii Politechniki Gdańskiej. Wcześniej odbył liczne pobyty w instytucjach naukowych, m.in. w Niemczech (Uniwersytety w Bonn i w Heidelbergu), Szwajcarii (ETH Zurich), Holandii (TU Eindhoven) i USA (Harvard University). Prof. Sikorski jest przedstawicielem Polski w komitecie TC13 Human-Computer-Interaction w międzynarodowej organizacji...

  • Interdisciplinary e-collaboration tools / Narzędzia interdyscyplinarnej e-współpracy

    W projektach interdyscyplinarnych niezwykle ważnym czynnikiem jest aktywne konsultowanie i bezpośrednie zastosowanie relatywnie nowo powstałej dziedziny zwanej współpracą interdyscyplinarną. Nawiązywanie interdyscyplinarnej współpracy przynosi wiele korzyści, jednakże niejednokrotnie wiąże się z licznymi problemami i niedogodnościami, a także koniecznością ciągłego doszkalania się i rozszerzania kompetencji zawodowych. Na podstawie...

    Pełny tekst do pobrania w portalu

  • Framework for RIDM within functional safety management process

    The functional safety management in life cycle is a complex process starting with identifying hazards and defining safety-related functions (SRFs) with risk assessment oriented at determining the safety integrity level. Another element of such life cycle is a verification of required SIL for designed safety-related system which implements safety function. Due to complexity of the problem, to overcome difficulties in safety-related...

  • Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues

    Management of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...

  • An Approach to the Detection of Bank Robbery Acts Employing Thermal Image Analysis

    Publikacja

    - Rok 2013

    A novel approach to the detection of selected security-related events in bank monitoring systems is presented. Thermal camera images are used for the detection of people in difficult lighting conditions. Next, the algorithm analyses movement of objects detected in thermal or standard monitoring cameras using a method evolved from the motion history images algorithm. At the same time, thermal images are analyzed in order to detect...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Public spaces connecting cities. Green and Blue Infrastructures potential.

    Publikacja

    A city fragmentation causes a lot of negative effects in urban environment such as: disconnecting the environmental, functional and compositional relations, a loss of urban compactness, chaotic development, visual chaos, a domination of technical landscape, reduction of security. This is why one of main challenges for urban planners is to connect the fragmented structures by creating friendly, attractive and safe public space....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Information and Communication Technologies for Economic Development

    Publikacja

    - Rok 2017

    This chapter is intended to explain why and how information and communication technologies may affect the process of socio-economic development, especially with regard to economically backward economies. It sheds light on why technological changes constitute prerequisites enabling advancements along the socio-economic development pattern. It is also designed to exhibit the special relevance of information and communication technologies...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Social Aspects of Information Technology

    Kursy Online
    • M. Wróbel
    • R. Bogdanowicz
    • M. Gnyba
    • M. Szczerska
    • D. Majchrowicz
    • A. Sękowska-Namiotko
    • K. Karpienko

    Subject of the course includes history of science and technics as well as social, economic, medical, health and legal aspects of Information Technology and related fields of science and technology.

  • Internal Security

    Czasopisma

    ISSN: 2080-5268

  • Information systems management - autumn 2023

    Kursy Online
    • J. Durkiewicz

    Information Systems in Management for International Management students. Autumn 2023

  • Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios

    Publikacja

    - IEEE Access - Rok 2020

    During and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...

    Pełny tekst do pobrania w portalu

  • Semi-definite programming and quantum information

    This paper presents a comprehensive exploration of semi-definite programming (SDP) techniques within the context of quantum information. It examines the mathematical foundations of convex optimization, duality, and SDP formulations, providing a solid theoretical framework for addressing optimization challenges in quantum systems. By leveraging these tools, researchers and practitioners can characterize classical and quantum correlations,...

    Pełny tekst do pobrania w portalu

  • Intelligent information services 23/24

    Kursy Online
    • J. Szymański

    Information retrieval Text categorization Natural language processing

  • Semantic technologies based method of collection, processing and sharing information along food chain

    Publikacja

    - Information Systems in Management - Rok 2016

    In the paper the method of collecting, processing and sharing information along food chain is presented. Innovative features of that method result from advantages of data engineering based on semantic technologies. The source to build ontology are standards and regulations related to food production, and data collected in databases owned by food chain participants. It allows food chain information resources can be represented in...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Chromatic cost coloring of weighted bipartite graphs

    Given a graph G and a sequence of color costs C, the Cost Coloring optimization problem consists in finding a coloring of G with the smallest total cost with respect to C. We present an analysis of this problem with respect to weighted bipartite graphs. We specify for which finite sequences of color costs the problem is NP-hard and we present an exact polynomial algorithm for the other finite sequences. These results are then extended...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Supporting Cybersecurity Compliance Assessment of Industrial Automation and Control System Components

    Publikacja

    The chapter presents a case study demonstrating how security requirements of an Industrial Automation and Control System (IACS) component can be represented in a form of Protection Profile that is based on IEC 62443 standards and how compliance assessment of such component can be supported by explicitly representing a conformity argument in a form based on the OMG SACM meta-model. It is also demonstrated how an advanced argument...

    Pełny tekst do pobrania w portalu

  • In Situ Verification of Numerical Model of Water Hammer in Slurries

    Publikacja

    This paper presents a numerical model of transient flow in a pressure slurry pipeline network with verification based on in situ measurements. The model, primarily verified in laboratory conditions, has been extended and applied to the case of a large and complex slurry pipeline network in Poland. In the model, the equivalent density concept was applied. In situ experiments were performed for various unsteady flow episodes, caused by...

    Pełny tekst do pobrania w portalu

  • A framework for automatic detection of abandoned luggage in airport terminal

    Publikacja

    A framework for automatic detection of events in a video stream transmitted from a monitoring system is presented. The framework is based on the widely used background subtraction and object tracking algorithms. The authors elaborated an algorithm for detection of left and removed objects based on mor-phological processing and edge detection. The event detection algorithm collects and analyzes data of all the moving objects in...

  • Bezpieczeństwo w IP Multimedia Subsystem

    Abstrakt Artykuł jest trzecim w cyklu prac poświęconych IP Multimedia Subsystem (IMS) - po przedstawieniu architektury i usług IMS, odpowiednio w zeszytach 12/2009 oraz 2-3/2011 Przeglądu Telekomunikacyjnego i Wiadomości Telekomunikacyjnych. W obecnym artykule przedstawiono sposoby zapewnienia bezpieczeństwa przy realizacji tych usług.Artykuł został podzielony został na trzy części w których omówiono ogólne wyzwania bezpieczeństwa...

  • Expert assessment of arguments: a method and its experimental evaluation

    Publikacja

    - Rok 2008

    Argument structures are commonly used to develop and present cases for safety, security and other properties. Such argument structures tend to grow excessively. To deal with this problem, appropriate methods of their assessment are required. Two objectives are of particular interest: (1) systematic and explicit assessment of the compelling power of an argument, and (2) communication of the result of such an assessment to relevant...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Nuclear power plant as a source of electrical energy and heat

    In this paper certain issues concerning usage of nuclear power plants as sources of not only electric power but also thermal energy will be discussed. For such a solution appeals most of all the need to limit harmful emissions of gases (including CO2) and ashes, which come from the process of burning fossil fuels, as well as the raising demand for network heat and chill. Additionally combined heat and power production brings measurable...

  • Eye-Gaze Tracking-Based Telepresence System for Videoconferencing

    An approach to the teleimmersive videoconferencing system enhanced by the pan-tilt-zoom (PTZ) camera, controlled by the eye-gaze tracking system, is presented in this paper. An overview of the existing telepresence systems, especially dedicated to videoconferencing is included. The presented approach is based on the CyberEye eye-gaze tracking system engineered at the Multimedia Systems Department (MSD) of Gdańsk University of Technology...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Bezpieczny Pracownik w Cyberprzestrzeni – Security Awareness

    Kursy Online
    • M. Kwaśniewski
    • P. Baniel
    • E. Michałowska
    • P. Traczyk
    • G. Czajka

  • Information content of systems as a physical principle

    Publikacja

    - PHYSICAL REVIEW A - Rok 2017

    To explain the conceptual gap between classical and quantum and other, hypothetical descriptions of the world, several principles have been proposed. So far, all these principles have not explicitly included the uncertainty relation. Here we introduce an information content principle ( ICP ) which represents a constrained uncertainty principle. The principle, by taking into account the encoding and decoding properties of a single physical...

    Pełny tekst do pobrania w portalu

  • The Diffusion of Information and Communication Technologies

    Publikacja

    - Rok 2018

    This book provides extensive evidence on information and communication technologies development patterns and dynamics of this process across developed economies over the period 1980 to the present day. It adopts newly developed methodology to identification of the ‘critical mass’ and isolation of technological takeoff intervals, which are intimately related to the process of technology diffusion. The statistically robust analysis...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Information Theory and Coding 2023/2024

    Kursy Online
    • M. Gajewska

    The course is an auxiliary tool for completing the subject Information Theory and Coding.  

  • Information theory and coding 2024/2025

    Kursy Online
    • M. Gajewska

    The course is an auxiliary tool for completing the subject Information Theory and Coding.  

  • Dynamic Semantic Visual Information Management

    Publikacja

    - Rok 2010

    Dominant Internet search engines use keywords and therefore are not suited for exploration of new domains of knowledge, when the user does not know specific vocabulary. Browsing through articles in a large encyclopedia, each presenting a small fragment of knowledge, it is hard to map the whole domain, see relevant concepts and their relations. In Wikipedia for example some highly relevant articles are not linked with each other....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Using EO satellite data in Safe City and Coastal Zone web-GIS

    The paper presents a novel design of a web-based Safe City & Coastal Zone GIS (SCCZ-GIS) which integrates data acquired from different remote sensing and geospatial data sources for monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilizes several innovative technologies and directly co-operates with different remote sensing data sources and services, like a satellite ground station...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Support for argument structures review and assessment

    Argument structures are commonly used to develop and present cases for safety, security and for other properties of systems. Such structures tend to grow excessively, which causes problems with their review and assessment. Two issues are of particular interest: (1) systematic and explicit assessment of the compelling power of an argument, and (2) communication of the result of such an assessment to relevant recipients. The paper...

    Pełny tekst do pobrania w portalu

  • Hedging Strategies of Derivatives Instruments for Commodity Trading Entities

    Publikacja

    - Rok 2015

    Hedging as an outcome of risk management arises to account several questions. Mentioned aspect of size of the hedging is one of them. Latter questioning refers to whether producer of manufacturer are willing to secure entire exposure, when the hedging should start, now or later in the future, what is the vision on market like direction of market, time of interest, magnitude of exposure, what would be the preferred instruments of...