Wyniki wyszukiwania dla: SECURITY EVALUATION - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: SECURITY EVALUATION

Wyniki wyszukiwania dla: SECURITY EVALUATION

  • New Challenges in Management and Economics in 21st century. Selected studies and examples

    Publikacja

    - Rok 2020

    In Chapter 1 authors describe the method used to assess the level of readiness of an organization to introduce the Lean Six Sigma concept supporting the Quality 4.0 assumptions, which is gaining more and more interest not only in large organizations, but also in the SME sector. Its use will be illustrated by the example of a small service company. Chapter 2 presents the characteristics of blockchain technology applications in the...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Society 4.0: Issues, Challenges, Approaches, and Enabling Technologies

    Publikacja

    - CYBERNETICS AND SYSTEMS - Rok 2024

    This guest edition of Cybernetics and Systems is a broadening continuation of our last year edition titled “Intelligence Augmentation and Amplification: Approaches, Tools, and Case Studies”. This time we cover research perspective extending towards what is known as Society 4.0. Bob de Vit brought the concept of Society 4.0 to life in his book “Society 4.0 – resolving eight key issues to build a citizens society”. From the Systems...

    Pełny tekst do pobrania w portalu

  • Comparison and Analysis of Service Selection Algorithms

    Publikacja

    - Rok 2013

    In Service Oriented Architecture, applications are developed by integration of existing services in order to reduce development cost and time. The approach, however, requires algorithms that select appropriate services out of available, alternative ones. The selection process may consider both optimalization requirements, such as maximalization of performance, and constraint requirements, such minimal security or maximum development...

  • CURRENT SITUATION ON THE POLAND REAL ESTATE MARKET

    Publikacja

    - Współpraca Europejska - Rok 2022

    In recent years the polish real estate market has been characterised by a significant increase in supply and demand. This was facilitated by a number of macroeconomic factors. In recent years, housing has been commissioned as 30 years ago. Therefore, the depth analysis issue of the causes and consequences for the Polish economy of these trends is now relevant. Among the reasons are significant economic growth, low interest rates...

    Pełny tekst do pobrania w portalu

  • The investment process in the power supply industry

    Publikacja

    - Rynek Energii - Rok 2012

    The basis for power supply industry programming in a market economy should be the principle of sustainable development, which must take into account maintaining an adequate level of energy security on the one hand, and the aim to preserve the maximum degree of non-renewable resources on the other hand. Therefore, the overriding aim should be a strive to meet the current and prospective demand for energy and fuel, in conjugation...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Digital Public Service Innovation: Framework Proposal

    Publikacja

    - Rok 2016

    This paper proposes the Digital Public Service Innovation Framework that extends the "standard" provision of digital public services according to the emerging, enhanced, transactional and connected stages underpinning the United Nations Global e-Government Survey, with seven example "innovations" in digital public service delivery -- transparent, participatory, anticipatory, personalized, co-created, context-aware and context-smart....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • An Automated Method for Biometric Handwritten Signature Authentication Employing Neural Networks

    Publikacja

    Handwriting biometrics applications in e-Security and e-Health are addressed in the course of the conducted research. An automated graphomotor analysis method for the dynamic electronic representation of the handwritten signature authentication was researched. The developed algorithms are based on dynamic analysis of electronically handwritten signatures employing neural networks. The signatures were acquired with the use of the...

    Pełny tekst do pobrania w portalu

  • Selection of an artificial pre-training neural network for the classification of inland vessels based on their images

    Publikacja

    - Zeszyty Naukowe Akademii Morskiej w Szczecinie - Rok 2021

    Artificial neural networks (ANN) are the most commonly used algorithms for image classification problems. An image classifier takes an image or video as input and classifies it into one of the possible categories that it was trained to identify. They are applied in various areas such as security, defense, healthcare, biology, forensics, communication, etc. There is no need to create one’s own ANN because there are several pre-trained...

    Pełny tekst do pobrania w portalu

  • Chromatographic analyses of Lavandula angustifolia and Rosmarinus officinalis extracts and their biological effects in mammalian cells and cell-free systems

    Publikacja

    - NEOPLASMA - Rok 2017

    Knowledge of biological properties of natural compounds allows to understand their therapeutic value, efficacy and security. We investigated: composition of Lavandula angustifolia (LA) and Rosmarinus officinalis (RO) extracts, their antioxidant capacity, cytotoxicity and genotoxicity, their DNA-protective potential against DNA damage induced in hamster V79 cells by several genotoxins or in plasmid DNA by Fe2+ ions and activity...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Automated Valuation Model based on fuzzy and rough set theory for real estate market with insufficient source data

    Publikacja

    - LAND USE POLICY - Rok 2019

    Objective monitoring of the real estate value is a requirement to maintain balance, increase security and minimize the risk of a crisis in the financial and economic sector of every country. The valuation of real estate is usually considered from two points of view, i.e. individual valuation and mass appraisal. It is commonly believed that Automated Valuation Models (AVM) should be devoted to mass appraisal, which requires a large...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Damage Detection Strategies in Structural Health Monitoring of Overhead Power Transmission System

    Publikacja

    Overhead power transmission lines, their supporting towers, insulators and other elements create a highly distributed system that is vulnerable to damage. Typical damage scenarios cover cracking of foundation, breakage of insulators, loosening of rivets, as well as cracking and breakage of lines. Such scenarios may result from various factors: groundings, lightning strikes, floods, earthquakes, aeolian vibrations, conductors galloping,...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Oxygen vacancy-enriched V2O5·nH2O nanofibers ink for universal substrates-tolerant and multi means-integratable NH3 sensing

    Publikacja
    • X. Xing
    • X. Zhao
    • Z. Li
    • L. Du
    • C. Wang
    • D. Feng
    • D. Geng
    • R. Bogdanowicz
    • D. Yang

    - CHEMICAL ENGINEERING JOURNAL - Rok 2023

    Universal substrates-tolerant and multi means-integratable ammonia (NH3) sensing is highly desired in future Internet of Things in environmental monitoring, food security and early diagnosis of human diseases, however, is still less than satisfactory. Here, an oxygen vacancy-governed NH3 sensing has been developed with V2O5·nH2O nanofibers (NFs) ink, via combined thermal decomposition of ammonium metavanadate and dilution. As-obtained...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Privacy-Preserving, Scalable Blockchain-Based Solution for Monitoring Industrial Infrastructure in the Near Real-Time

    This paper proposes an improved monitoring and measuring system dedicated to industrial infrastructure. Our model achieves security of data by incorporating cryptographical methods and near real-time access by the use of virtual tree structure over records. The currently available blockchain networks are not very well adapted to tasks related to the continuous monitoring of the parameters of industrial installations. In the database...

    Pełny tekst do pobrania w portalu

  • Digital Innovations and Smart Solutions for Society And Economy: Pros and Cons

    Publikacja

    Recent developments in artificial intelligence (AI) may involve significant potential threats to personal data privacy, national security, and social and economic stability. AI-based solutions are often promoted as “intelligent” or “smart” because they are autonomous in optimizing various processes. Be-cause they can modify their behavior without human supervision by analyzing data from the environ-ment, AI-based systems may be...

    Pełny tekst do pobrania w portalu

  • BeesyBees: A mobile agent-based middleware for a reliable and secure execution of service-based workflow applications in BeesyCluster

    Integrating distributed services into workflows comes with its own set of challenges, including security, coordination, fault tolerance and optimisation of execution time. This paper presents an architecture and implementation - nicknamed BeesyBees - that allows distributed execution of workflow applications in BeesyCluster using agents. BeesyCluster is a middleware that allows users to access distributed resources as well as publish...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Tracking of the broadband source of the underwater noise in the very shallow water conditions

    Publikacja

    The paper contains the result s, both theoretical and experimental , connected with the tracking of the underwater noise source as small ships, pontoon , diver and so on. The pro blem of security in the shallow water area is the challenge for underwater acousticians. In this paper there is take n into account the detection of the sources that move on the surface of the sea or underwater in shallow...

    Pełny tekst do pobrania w portalu

  • The fast identification of explosives, natcotics and other chemicals carried on board of ships or transported in containers

    Publikacja

    - Rok 2011

    The fast identification of explosives, narcotics and other chemicals carried on board of ships or transported in containers to the harbors is an important problem of maritime security. Raman spectroscopy is an advanced technique used in state-of-the art laboratories for fast identification of chemicals. No sample preparation is required, and identification can be carried out through transparent packing, such as plastic or glass,...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Student Perspectives on the 2017 ESA Concurrent Engineering Challenge

    Publikacja
    • K. Doerksen
    • T. van‘t Klooster
    • W. Ferguson
    • S. Pepper
    • D. van Paridon
    • R. Amorim
    • R. Chotalal
    • K. Ciechowska
    • A. Dąbrowski
    • V. Kunbrger... i 4 innych

    - Rok 2018

    In September 2017, the first ESA Academy’s Concurrent Engineering Challenge (CEC) was held, giving 88 Master’s and PhD-level students from twelve ESA Member and Associate States a powerful platform to experience system engineering in an intense, fast paced, and real-world environment. Within four days, teams of physics and engineering students in Concurrent Design Facilities (CDF) located in Politecnico di Torino, Universidad Polit´ecnica...

    Pełny tekst do pobrania w portalu

  • Comparison of AHP and Numerical Taxonomy Methods Based on Biogas Plant Location Analysis

    Publikacja

    The paper presents a comparison of the multi-criteria Analytic Hierarchy Process (AHP) method and numerical taxonomy in biogas plant location selection. Biogas plants are sources that will significantly contribute to the implementation of the provisions of the energy and climate package for Poland by 2030. Increasing the share of energy produced from renewable sources, e.g. biogas plants, will increase the country’s energy security....

    Pełny tekst do pobrania w portalu

  • Development of the System Assurance Reference Model for Generating Modular Assurance Cases

    Publikacja

    - Rok 2023

    Assurance cases are structured arguments used to demonstrate specific system properties such as safety or security. They are used in many industrial sectors including automotive, aviation and medical devices. Larger assurance cases are usually divided into modules to manage the complexity and distribute the work. Each of the modules is developed to address specific goals allocated to the specific objects i.e. components of the...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Overview of Metamaterials-Integrated Antennas for Beam Manipulation Applications: The Two Decades of Progress

    Publikacja

    - IEEE Access - Rok 2022

    Metamaterials (MMs) are synthetic composite structures with superior properties not found in naturally occurring materials. MMs have gained massive attention over the last two decades because of their extraordinary properties, such as negative permittivity and permeability. These materials enable many applications in communication subsystems, especially in the field of antenna design, to enhance gain, bandwidth, and efficiency,...

    Pełny tekst do pobrania w portalu

  • Testy platformy SAN dla sektora elektroenergetycznego

    Współczesna infrastruktura elektroenergetyczna jest narażona na zagrożenia związane z dużą liczbą nowych luk i słabo- ści architektonicznych wynikających z szerszego wykorzystania technologii informacyjnych i komunikacyjnych (ang. Information and Communication Technologies – ICT). Połączenie infrastruktury elektroenergetycznej z Internetem naraża ją na nowe rodzaje ataków, takie jak ataki typu APT (ang. Advanced Persistent Threats)...

    Pełny tekst do pobrania w portalu

  • Urban city lights. Light pollution as one of the effects of incorrectly designed external illumination. How can a successful lighting masterplan diminish its impact?

    Publikacja
    • K. M. Zielińska-Dąbkowska

    - Rok 2014

    In the modern world, artificial lighting brings many tangible benefits such as the ability to extend working hours and so increase production, recreational use of the city after dark, or the possibility to travel regardless of the time of day. However, this flexibility comes at a price and negatively impacts on the environment. One such negative phenomenon is Light Pollution ‐ a term used to describe excessive nighttime artificial...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Hybrid no-signaling-quantum correlations

    Publikacja

    - NEW JOURNAL OF PHYSICS - Rok 2022

    Fundamental investigations in non-locality have shown that while the no-signaling principle alone is not sufficient to single out the set of quantum non-local correlations, local quantum mechanics and no-signaling together exactly reproduce the set of quantum correlations in the two-party Bell scenario. Here, we introduce and study an intermediate hybrid no-signaling quantum set of non-local correlations that we term HNSQ in the...

    Pełny tekst do pobrania w portalu

  • Analysis of electricity generation variability in 2019 with special consideration of electrical energy generation from wind sources.

    Publikacja

    - Rok 2020

    This article presents issues related to the broadly understood development of wind energy. The state of the art of wind energy in the world has been discussed. This paper also shows issues related to factors affecting the development of renewable energy sources and their impact on the natural environment on the basis of available research. The focus is, however, on the critical analysis of phenomena in the data of the Transmission...

    Pełny tekst do pobrania w portalu

  • Extraction of stable foreground image regions for unattended luggage detection

    A novel approach to detection of stationary objects in the video stream is presented. Stationary objects are these separated from the static background, but remaining motionless for a prolonged time. Extraction of stationary objects from images is useful in automatic detection of unattended luggage. The proposed algorithm is based on detection of image regions containing foreground image pixels having stable values in time and...

    Pełny tekst do pobrania w portalu

  • Wyzwania metodyczne w procesie zarządzania bezpieczeństwem elektrowni jądrowych

    Publikacja

    - Rok 2012

    W pracy przedstawiono aktualne zagadnienia i wyzwania metodyczne dotyczące zarządzania bezpieczeństwem elektrowni jądrowych. Nawiązuje się m.in. do publikacji Międzynarodowej Agencji Energii Atomowej z siedzibą w Wiedniu w sprawie zintegrowanego podejścia do zarządzaniu bezpieczeństwem (safety) i ochroną (security). Podkreśla się znaczenie projektowania niezależnych barier w systemie zabezpieczeń i zwiększania roli pasywnych układów...

  • Customization of UWB 3D-RTLS Based on the New Uncertainty Model of the AoA Ranging Technique

    Publikacja

    - SENSORS - Rok 2017

    The increased potential and effectiveness of Real-time Locating Systems (RTLSs) substantially influence their application spectrum. They are widely used, inter alia, in the industrial sector, healthcare, home care, and in logistic and security applications. The research aims to develop an analytical method to customize UWB-based RTLS, in order to improve their localization performance in terms of accuracy and precision. The analytical...

    Pełny tekst do pobrania w portalu

  • Fatigue and Professional Burnout in Police Officers and Firefighters

    Publikacja

    - Internal Security - Rok 2012

    Excessive demands, work overload and the working time arrangements are an important cause of burnout and fatigue in employees. Specific working time arrangements are characteristic of the internal security services, such as police officers and firefighters. This applies to both the ordering of day and night shifts and the length of shifts. Depletion of personal resources is a common component for acute fatigue and burnout. However,...

    Pełny tekst do pobrania w portalu

  • Innovative method of localization airplanes in VCS (VCS-MLAT) distributed system

    Publikacja

    - Rok 2019

    The article presents the concept and the structure of the localization module. The prototype module is the part of the VCS (VCS-MLAT) localization distributed system. The device receives the audio signal transmitted in airplanes band (118 MHz – 136 MHz). Received data with the timestamps are send to the main server. The data from multiple devices estimates the localization of the airplane. The main aim of the project is the analysis...

  • Narracje o świeżej traumie. Upamiętnianie ataków terrorystycznych w krajobrazie codziennym miast

    Recent trauma Narratives: commemorating terrorist attacks in Everyday cityscape Contemporary city incidentally becomes a non-accidental target of acts violating the primary sense of security and safety. The fundamental assumptions about so- cial and interpersonal interactions that guarantee social life are severely disturbed. These events, primarily the ones related to terrorist attacks, leave in social memo- ry traces associated...

    Pełny tekst do pobrania w portalu

  • Zastosowanie szablonów Trust Case w pracy z normą BS 7799

    Publikacja

    - Rok 2006

    Trust Case stanowi strukturę danych zawierającą argumentację oraz związany z nią materiał dowodowy uzasadniający, że interesujący nas obiekt (system, infrastruktura, organizacja) posiada wskazane własności. Wykorzystanie Trust Case do analizy i uzasadniania zaufania do systemów IT jest przedmiotem aktywnych badań. Podejście to znalazło zastosowanie w stosunku do systemów związanych z bezpieczeństwem (ang. safety critical), a ostatnio...

  • Performance Analysis of Machine Learning Methods with Class Imbalance Problem in Android Malware Detection

    Publikacja
    • A. G. Akintola
    • A. O. Balogun
    • H. A. Mojeed
    • F. Usman-Hamza
    • S. A. Salihu
    • K. S. Adewole
    • G. B. Balogun
    • P. O. Sadiku

    - International Journal of Interactive Mobile Technologies - Rok 2022

    Due to the exponential rise of mobile technology, a slew of new mobile security concerns has surfaced recently. To address the hazards connected with malware, many approaches have been developed. Signature-based detection is the most widely used approach for detecting Android malware. This approach has the disadvantage of being unable to identify unknown malware. As a result of this issue, machine learning (ML) for detecting malware...

    Pełny tekst do pobrania w portalu

  • On symmetric extendibility of quantum states and its applications

    Publikacja

    - Rok 2017

    This dissertation is focused on analysis of the symmetric extendibility of quantum states and its applications in the quantum information theory, with special attention paid to the area of quantum entanglement distillation, quantum channels theory, quantum security, and monogamy of quantum entanglement in time. We analyze geometry of the set of symmetric extendible states, i.e. such states that possess symmetric extensions and...

    Pełny tekst do pobrania w portalu

  • Greencoin: a Pro­environmental Action-­Reward System

    Publikacja

    The massive destruction of the natural environment is rapidly eroding the world’s capacity to provide food and water, threatening the security of billions of people. In order to facilitate green lifestyles – understood in terms of both pro-environmental behaviors and green self-image on the one hand, and to build sustainable local and global communities, on the other, we put forward an idea of a novel action-reward system based...

    Pełny tekst do pobrania w portalu

  • Badanie sieci świadomości sytuacyjnej dla infrastruktury elektroenergetycznej

    Współczesne systemy elektroenergetyczne są narażone na nowe rodzaje zagrożeń. Są one spowodowane lukami w zabezpieczeniach oraz słabościami architektonicznymi związanymi z szerszym zastosowaniem technologii teleinformatycznych (ICT) w tych systemach. Połączenie sieci elektroenergetycznych z Internetem naraża je na nowego rodzaju niebezpieczeństwa, takie jak ataki APT (ang. Advanced Persistent Threats) lub rozproszona odmowa usługi...

    Pełny tekst do pobrania w portalu

  • Randomness Amplification under Minimal Fundamental Assumptions on the Devices

    Publikacja
    • R. Ramanathan
    • F. Brandão
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • H. Wojewódka

    - PHYSICAL REVIEW LETTERS - Rok 2016

    Recently, the physically realistic protocol amplifying the randomness of Santha-Vazirani sources producing cryptographically secure random bits was proposed; however, for reasons of practical relevance, the crucial question remained open regarding whether this can be accomplished under the minimal conditions necessary for the task. Namely, is it possible to achieve randomness amplification using only two no-signaling components...

    Pełny tekst do pobrania w portalu

  • Functional safety and reliability analysis methodoloogy for hazardous industrial plants

    Publikacja

    - Rok 2013

    This monograph is devoted to current problems and methods of the functional safety and reliability analyses of the programmable control and protection systems for industrial hazardous plants. The results of these analyses are useful in the process of safety management in life cycle, for effective reducing relevant risks at the design stage, and then controlling these risks during the operation of given installation. The methodology...

  • Comprehensive thermodynamic analysis of steam storage in a steam cycle in a different regime of work: A zero-dimensional and three-dimensional approach

    Due to the current trends aiming to reduce carbon dioxide emissions by increasing the use of renewable energy sources, changes are required in the operation of coal-fired steam units. The unstable nature of renewable energy sources, depending on weather conditions, means that the amount of energy produced varies and is not always in line with peak demand. To ensure the security and stability of energy supplies in the energy system,...

    Pełny tekst do pobrania w portalu

  • Robot-Based Intervention for Children With Autism Spectrum Disorder: A Systematic Literature Review

    Publikacja
    • K. D. Bartl-Pokorny
    • P. Uluer
    • D. E. Barkana
    • A. Baird
    • H. Kose
    • T. Zorcec
    • B. Robins
    • B. Schuller
    • A. Landowska
    • M. Pykała

    - IEEE Access - Rok 2021

    Children with autism spectrum disorder (ASD) have deficits in the socio-communicative domain and frequently face severe difficulties in the recognition and expression of emotions. Existing literature suggested that children with ASD benefit from robot-based interventions. However, studies varied considerably in participant characteristics, applied robots, and trained skills. Here, we reviewed robot-based interventions targeting...

    Pełny tekst do pobrania w portalu

  • Calibration of acoustic vector sensor based on MEMS microphones for DOA estimation

    Publikacja

    A procedure of calibration of a custom 3D acoustic vector sensor (AVS) for the purpose of direction of arrival (DoA) estimation, is presented and validated in the paper. AVS devices working on a p-p principle may be constructed from standard pressure sensors and a signal processing system. However, in order to ensure accurate DoA estimation, each sensor needs to be calibrated. The proposed algorithm divides the calibration process...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Amplifying the Randomness of Weak Sources Correlated With Devices

    Publikacja

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Rok 2017

    The problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The KLC Cultures, Tacit Knowledge, and Trust Contribution to Organizational Intelligence Activation

    Publikacja

    - Rok 2023

    In this paper, the authors address a new approach to three organizational, functional cultures: knowledge culture, learning culture, and collaboration culture, named together the KLC cultures. Authors claim that the KLC approach in knowledge-driven organizations must be designed and nourished to leverage knowledge and intellectual capital. It is suggested that they are necessary for simultaneous implementation because no one of...

    Pełny tekst do pobrania w portalu

  • Protection System Design of Induction Motor for Industries

    Publikacja

    - Rok 2022

    The fundamental and durable structures of induction motor, as well as their low manufacturing cost, make them popular components in a wide range of current applications. Providing a safety net for employees is a must-have for businesses. This project’s motivation for improvement is to provide industrial motors, lift motors, pumps, and so on with safety. An induction motor’s primary goal is to protect it from problems, such as...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Protection System Design of Induction Motor for Industries

    Publikacja

    - Modelling and Simulation in Engineering - Rok 2022

    The fundamental and durable structures of induction motor, as well as their low manufacturing cost, make them popular components in a wide range of current applications. Providing a safety net for employees is a must-have for businesses. This project’s motivation for improvement is to provide industrial motors, lift motors, pumps, and so on with safety. An induction motor’s primary goal is to protect it from problems, such as...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Improved RSS-Based DoA Estimation Accuracy in Low-Profile ESPAR Antenna Using SVM Approach

    In this paper, we have shown how the overall performance of direction-of-arrival (DoA) estimation using lowprofile electronically steerable parasitic array radiator (ESPAR) antenna, which has been proposed for Internet of Things (IoT) applications, can significantly be improved when support vector machine (SVM) approach is applied. Because the SVM-based DoA estimation method used herein relies solely...

    Pełny tekst do pobrania w portalu

  • Audio content analysis in the urban area telemonitoring system

    Publikacja

    Artykuł przedstawia możliwości rozwinięcie monitoringu miejskiego o automatyczną analizę dźwięku. Przedstawiono metody parametryzacji dźwięku, które możliwe są do zastosowania w takim systemie oraz omówiono aspekty techniczne implementacji. W kolejnej części przedstawiono system decyzyjny oparty na drzewach zastosowany w systemie. System ten rozpoznaje dźwięki niebezpieczne (strzał, rozbita szyba, krzyk) wśród dźwięków zarejestrowanych...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Edible dragonflies and damselflies (order Odonata) as human food – A comprehensive review

    Publikacja
    • S. A. Siddiqui
    • K. Asante
    • N. Ngah
    • Y. Saraswati
    • Y. Wu
    • M. Lahan
    • O. Aidoo
    • I. Fernando
    • S. Povetkin
    • R. Castro Munoz

    - Journal of Insects as Food and Feed - Rok 2024

    The rapid growth of the human population leads to a big concern about the food y and demand worldwide. However, due to the reduction in global arable land area, humans need to find alternative food sources to fulfil their needs. Consequently, edible insects have been identified as a promising solution to ameliorate food security and increase global nutrition. Among more than 2,100 identified edible insect species, dragonflies and...

    Pełny tekst do pobrania w portalu

  • OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems

    Publikacja
    • S. S. Narayana Chintapalli
    • S. Prakash Singh
    • J. Frnda
    • B. P. Divakarachar
    • V. L. Sarraju
    • P. Falkowski-Gilski

    - Heliyon - Rok 2024

    Currently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...

    Pełny tekst do pobrania w portalu

  • Empirical Analysis of Forest Penalizing Attribute and Its Enhanced Variations for Android Malware Detection

    Publikacja
    • A. G. Akintola
    • A. O. Balogun
    • L. F. Capretz
    • H. A. Mojeed
    • S. Basri
    • S. A. Salihu
    • F. E. Usman-Hamza
    • P. O. Sadiku
    • G. B. Balogun
    • Z. O. Alanamu

    - Applied Sciences-Basel - Rok 2022

    As a result of the rapid advancement of mobile and internet technology, a plethora of new mobile security risks has recently emerged. Many techniques have been developed to address the risks associated with Android malware. The most extensively used method for identifying Android malware is signature-based detection. The drawback of this method, however, is that it is unable to detect unknown malware. As a consequence of this problem,...

    Pełny tekst do pobrania w portalu