Wyniki wyszukiwania dla: SYSTEM SECURITY - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: SYSTEM SECURITY

Wyniki wyszukiwania dla: SYSTEM SECURITY

  • Radiokomunikacja morska - problemy eksploatacyjne i rozwój

    Publikacja

    - Rok 2006

    W pracy omówiono stan obecny oraz wynikające z tego problemy eksploatacyjne występujące w radiokomunikacji morskiej, ze szczególnym odniesieniem do zagadnień związanych z bezpieczeństwem pracy na morzu. Scharakteryzowano kierunki rozwoju w obszarach głównych podsystemów składowych tej dziedziny łączności radiowej. Poruszono także coraz bardziej aktualny problem zastosowania systemów łączności dla potrzeb ochrony żeglugi (maritime...

  • Założenia modelu zarządzania kryzysowego bezpieczeństwem w portach morskich

    Publikacja

    Złożoność przestrzenna i gospodarcza oraz silne oddziaływanie działalności portowej na procesy społeczno-gospodarcze w regionie, wymaga opracowania specjalnego podejścia do zarządzania bezpieczeństwem na obszarach portowych. W pracy przedstawiono założenia modelu zarządzania kryzysowego bezpieczeństwem w portach morskich uwzględniające zasady międzynarodowego kodeksu ISPS (International Ship and Port Security Code) oraz wymagania...

  • Challenges in providing support for management of evidence-based arguments

    The paper considers selected challenges related to the application of evidence based arguments and maps them on the tool support level. In particular, we consider: communication and teamwork, handling large arguments, evidence management and integration, argument assessment and communication, change control and reporting, evidence reuse, user data security and argument portfolio management. Then we explain how these challenges...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • RSS-Based DoA Estimation Using ESPAR Antenna for V2X Applications in 802.11p Frequency Band

    Publikacja

    In this paper, we have proposed direction-of arrival (DoA) estimation of incoming signals for V2X applications in 802. 11p frequency band, based on recording of received signal strength (RSS) at electronically steerable parasitic array radiator (ESPAR) antenna's output port. The motivation of the work was to prove that ESPAR antenna used to increase connectivity and security in V2X communication can be also used for DoA estimation....

    Pełny tekst do pobrania w portalu

  • Modeling the impact of surface currents in a harbor using graph theory

    Publikacja

    - Zeszyty Naukowe Akademii Morskiej w Szczecinie - Rok 2016

    Ensuring security in a harbor requires research into its infrastructure using spatial environmental data. This paper presents a methodology that defines the design of a graph for modeling the interactions between surface currents and moving objects. Combining this graph with port charts that integrate electronic navigation charts with coastal orthophotographs allows us to perform a multidimensional analysis. In addition, the complete...

    Pełny tekst do pobrania w portalu

  • Standards Conformity Framework in comparison with contemporary methods supporting standards application

    Publikacja

    - Rok 2008

    Achieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is spent on fulfilment of safety and security requirements. However, standards application is not supported sufficiently by the tools available on the market. Therefore, Standards Conformity Framework (SCF) containing methods and tools which provide support...

  • A Novel Multicast Architecture of Programmable Networks

    Publikacja

    - Rok 2015

    In the paper a multicast architecture for programmable networks based on separation of group management and network control tasks is proposed. Thanks to this separation, services which want to make use of multicast communications no longer have to implement low-level network functionalities and their operation is greatly simplified. Abstracting service’s view of the network into a fully connected cloud enables us to transparently...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Recognition of hazardous acoustic events employing parallel processing on a supercomputing cluster . Rozpoznawanie niebezpiecznych zdarzeń dźwiękowych z wykorzystaniem równoległego przetwarzania na klastrze superkomputerowym

    Publikacja

    A method for automatic recognition of hazardous acoustic events operating on a super computing cluster is introduced. The methods employed for detecting and classifying the acoustic events are outlined. The evaluation of the recognition engine is provided: both on the training set and using real-life signals. The algorithms yield sufficient performance in practical conditions to be employed in security surveillance systems. The...

  • Cybersecurity and Privacy in Standards for Smart Grids – a Comprehensive Survey

    Resilient information and communications technologies are a prerequisite for reliable operation of smart grid. In recent years, many standards for the new form of electricity network have been proposed, which results in operators and other smart grid stakeholders having difficulties in finding the documents which can be related to their particular problems. The purpose of this paper is to bring in all smart grid standards that...

    Pełny tekst do pobrania w portalu

  • Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues

    Management of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...

  • Public spaces connecting cities. Green and Blue Infrastructures potential.

    Publikacja

    A city fragmentation causes a lot of negative effects in urban environment such as: disconnecting the environmental, functional and compositional relations, a loss of urban compactness, chaotic development, visual chaos, a domination of technical landscape, reduction of security. This is why one of main challenges for urban planners is to connect the fragmented structures by creating friendly, attractive and safe public space....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Edible black ant Smith (Carebara vidua) as human food – A systematic review

    Publikacja
    • S. A. Siddiqui
    • L. Ho
    • S. Adimulam
    • A. Nagdalian
    • B. Yudhistira
    • R. Castro Munoz
    • S. Ibrahim

    - Journal of Insects as Food and Feed - Rok 2024

    Meeting food security is one of the major global challenges to ensure sufficient supply of food for current and future generations, considering increasing population growth and climate change issues. Consequently, the consumption of edible insects as an alternative food source has recently gained global attention for combating global food insecurity. The present review aims to provide information on the recent progress in consumption...

    Pełny tekst do pobrania w portalu

  • Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios

    Publikacja

    - IEEE Access - Rok 2020

    During and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...

    Pełny tekst do pobrania w portalu

  • A mobile hospital – its advantages and functional limitations

    The idea of a mobile hospital is not entirely new – the need for their use, ranging from military field hospitals to the charity or mass disaster tent cities, shows how much they are needed. While these cases can be reduced to a portable ambulatory unit with a limited scope of outpatient medical activities, a fully functional hospital is a system with a high degree of complexity far exceeding a regime of compact objects. Solutions...

    Pełny tekst do pobrania w portalu

  • Expert assessment of arguments: a method and its experimental evaluation

    Publikacja

    - Rok 2008

    Argument structures are commonly used to develop and present cases for safety, security and other properties. Such argument structures tend to grow excessively. To deal with this problem, appropriate methods of their assessment are required. Two objectives are of particular interest: (1) systematic and explicit assessment of the compelling power of an argument, and (2) communication of the result of such an assessment to relevant...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Bezpieczeństwo w IP Multimedia Subsystem

    Abstrakt Artykuł jest trzecim w cyklu prac poświęconych IP Multimedia Subsystem (IMS) - po przedstawieniu architektury i usług IMS, odpowiednio w zeszytach 12/2009 oraz 2-3/2011 Przeglądu Telekomunikacyjnego i Wiadomości Telekomunikacyjnych. W obecnym artykule przedstawiono sposoby zapewnienia bezpieczeństwa przy realizacji tych usług.Artykuł został podzielony został na trzy części w których omówiono ogólne wyzwania bezpieczeństwa...

  • Political Parties in the Digital World

    Publikacja

    - Rok 2017

    The aim of this report is to outline how digital technologies and digital media are redefining the way political parties fulfill their role as collective platforms for political participation of citizens, e.g. in relation to the parties’ decision-making processes, communication strategies, funding mechanisms, membership, information sharing, etc. and to highlight the existing international standards and good practices in this area....

  • COPCAMS Kamery umożliwiające kontekstowe rozumienie pozyskiwanego obrazu

    Projekty

    Kierownik projektu: prof. dr hab. inż. Andrzej Czyżewski   Program finansujący: ARTEMIS

    Projekt realizowany w Wydział Elektroniki, Telekomunikacji i Informatyki zgodnie z porozumieniem 332913 z dnia 2013-11-25

  • Low-dimensional bound entanglement with one-way distillable cryptographic key

    Publikacja

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Rok 2008

    In this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...

  • Hedging Strategies of Derivatives Instruments for Commodity Trading Entities

    Publikacja

    - Rok 2015

    Hedging as an outcome of risk management arises to account several questions. Mentioned aspect of size of the hedging is one of them. Latter questioning refers to whether producer of manufacturer are willing to secure entire exposure, when the hedging should start, now or later in the future, what is the vision on market like direction of market, time of interest, magnitude of exposure, what would be the preferred instruments of...

  • A model-based approach to analysis of authentication protocols.

    Publikacja

    - Rok 2004

    W referacie przedstawiono zintegrowane podejście do analizy protokołów uwierzytelniania o nazwie Object-oriented Formal Authentication Protocol Security Analysis Framework (OF-APSAF). Podejście to jest zaprojektowane na bazie sprawdzonej metody formalnej CSP wraz z narzędziami ją wspierającymi: Casper oraz FDR. Jego integralną częścią jest półformalna zorientowana obiektowo technika modelowania protokołów, ich kontekstu oraz wymagań...

  • I, Robot: between angel and evil

    Publikacja

    - Rok 2020

    The boosting of most digital innovations within recent technology progress by artificial intelligence (AI) constitutes a growing topic of interest. Besides its technical aspects, increasing research activity may be observed in the domain of security challenges, and therefore of responsibility related to the controlled or hypothetically uncontrolled or autonomous emergence of AI solutions. Consequently, responsibility and ethics...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Deep Learning: A Case Study for Image Recognition Using Transfer Learning

    Publikacja

    - Rok 2021

    Deep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Deep Learning

    Publikacja

    - Rok 2021

    Deep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Methodological issues of functional safety and reliability assessment of critical systems in industrial hazardous plants

    The aim of this article is to identify and discuss some methodological issues that are of interest among functional safety specialists and experts after publication of the second edition of international standards IEC 61508 and IEC 61511, including the design and implementing the safety-related functions of higher safety integrity levels and protection layers. The basic role of safety-related systems is to reduce effectively and...

  • Coastal zone monitoring using Sentinel-1 SAR polarymetry data

    Publikacja

    In recent years the role of the surveillance and security of Polish boundaries has significantly increased. Polish coastal zone monitoring requires various approaches using various technological means in order to ensure the protection of Polish boundaries. In this paper, the authors discuss and present alternatives to underwater surveillance methods of coastal area analysis and monitoring using data retrieved from the newly developed...

    Pełny tekst do pobrania w portalu

  • ADAPTIVE PREDICTIONS OF THE EURO/ZŁOTY CURRENCY EXCHANGE RATE USING STATE SPACE WAVELET NETWORKS AND FORECAST COMBINATIONS

    Publikacja

    The paper considers the forecasting of the euro/Polish złoty (EUR/PLN) spot exchange rate by applying state space wavelet network and econometric forecast combination models. Both prediction methods are applied to produce one-trading-day- ahead forecasts of the EUR/PLN exchange rate. The paper presents the general state space wavelet network and forecast combination models as well as their underlying principles. The state space...

    Pełny tekst do pobrania w portalu

  • The Impact of Ergonomic Guiding Principles on the Formation of Modern Monumental Art

    Commemoration of historic events is now a commonplace phenomenon both in culture and in academic research. The phenomenon is linked to an increase in the representation of the visualisation of the past in public sphere, which in turn leads to reformulation of monumental art. Modern monuments are often spatial forms consisting both of sculpture installation and bigger constructions. In case of these realisations, the designers,...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Integration and Visualization of the Results of Hydrodynamic Models in the Maritime Network-Centric GIS of Gulf of Gdansk

    Publikacja

    - Rok 2016

    Ensuring of security in the coastal area makes on a seaside countries research in the field of infrastructure spatial information of environmental data. The paper presents the results of work on the construction of this infrastructure by integrating electronic navigational chart with ortophotomaps of coastal areas as well as numerical data from weather and hydrodynamic models. Paper focuses on a problems associated with creating...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A fair distribution scheme for joint fingerprinting and decryption methods= Sprawiedliwy schemat dystrybucji dla metod łącznego osadzania odcisku palca oraz deszyfracji

    The paper addresses the fairness of the security provided by digital fingerprinting methods. It was noted that the digital fingerprinting techniques are designed primarily to protect service providers against the actions of malicious users, while honest users remain vulnerable to acts of malicious providers. The paper describes the customer's rights problem and the unbinding problem, which also apply to joint fingerprinting and...

  • On the fast BSS transition algorithms in the IEEE 802.11r local area wireless networks

    Handover performance is critical to support multimedia services that are becoming increasingly available over the wireless devices. The high transition delay can be unaccepted for such services or can be a source of disruption on the session. On the other side, IEEE 802.11 standard is being extended with new functionalities. Security and QoS features, included in recent IEEE 802.11-2007 standard, add management frames that are...

    Pełny tekst do pobrania w portalu

  • Towards the value-based design of on-line services

    Publikacja

    The paper identifies economic factors shaping customer bahaviour in on-line services in two interrelated dimensions; (1) economic needs and requirements, relevant to expected benefits and values perceived by customers; (2) technical components, allowing technical realization of on-line services. Technical components were cathegorized into four groups, creating so-called VIPR model: Visual, Interactive, Process and Relationship-relevant...

  • Trustworthy Applications of ML Algorithms in Medicine - Discussion and Preliminary Results for a Problem of Small Vessels Disease Diagnosis.

    Publikacja

    - Rok 2022

    ML algorithms are very effective tools for medical data analyzing, especially at image recognition. Although they cannot be considered as a stand-alone diagnostic tool, because it is a black-box, it can certainly be a medical support that minimize negative effect of human-factors. In high-risk domains, not only the correct diagnosis is important, but also the reasoning behind it. Therefore, it is important to focus on trustworthiness...

    Pełny tekst do pobrania w portalu

  • A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks

    Publikacja

    - Rok 2021

    For traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS

    The research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Hazardous material-related propagation of the effects of train accidents in the subgrade

    A large part of the transport of hazardous materials is carried out by rail. Therefore, the security of these transports is becoming increasingly important. Every catastrophe involving dangerous materials has a negative impact on the participants of the incident and the surrounding environment, because its range is generally not local. It follows that in the event of a catastrophe, its effects should be minimized and remediation...

    Pełny tekst do pobrania w portalu

  • Realistic noise-tolerant randomness amplification using finite number of devices

    Publikacja
    • F. Brandão
    • R. Ramanathan
    • A. Grudka
    • K. Horodecki
    • M. Horodecki
    • P. Horodecki
    • T. Szarek
    • H. Wojewódka

    - Nature Communications - Rok 2016

    Randomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...

    Pełny tekst do pobrania w portalu

  • A Triplet-Learnt Coarse-to-Fine Reranking for Vehicle Re-identification

    Publikacja

    - Rok 2020

    Vehicle re-identification refers to the task of matching the same query vehicle across non-overlapping cameras and diverse viewpoints. Research interest on the field emerged with intelligent transportation systems and the necessity for public security maintenance. Compared to person, vehicle re-identification is more intricate, facing the challenges of lower intra-class and higher inter-class similarities. Motivated by deep...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Integrating web site services into application through user interface

    The issue of integrating applications which are only accessible through visual user interface is not thoroughly researched. Integration of web applications running remotely and controlled by separate organizations becomes even more complicated, as their user interface can display differently in different browsers or change without prior notification as a result of application maintenance. While possible, it is generally not common...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej – wymagania i kryteria

    Publikacja

    Niniejsza praca poświęcona jest zagadnieniom zarządzania bezpieczeństwem funkcjonalnym w cyklu życia z uwzględnieniem norm międzynarodowych PN-ENIEC 61508 i PN-ENIEC 61511 oraz zarządzaniu bezpieczeństwem informacji w systemach i sieciach komputerowych w nawiązaniu do wytycznych OECD i wymagań normy PN-ISO/IEC 27001. Rozważa się przykłady skupionych i rozproszonych sieci komputerowych pełniących funkcje monitorowania, sterowania...

  • Algorithms of chemicals detection using raman spectra

    Raman spectrometers are devices which enable fast and non-contact identification of examined chemicals. These devices utilize the Raman phenomenon to identify unknown and often illicit chemicals (e.g. drugs, explosives)without the necessity of their preparation. Now, Raman devices can be portable and therefore can be more widely used to improve security at public places. Unfortunately, Raman spectra measurements is a challenge...

    Pełny tekst do pobrania w portalu

  • Federated Learning in Healthcare Industry: Mammography Case Study

    The paper focuses on the role of federated learning in a healthcare environment. The experimental setup involved different healthcare providers, each with their datasets. A comparison was made between training a deep learning model using traditional methods, where all the data is stored in one place, and using federated learning, where the data is distributed among the workers. The experiment aimed to identify possible challenges...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Flexicurity. Elastyczność i bezpieczeństwo

    Publikacja

    - Rok 2011

    Flexicurity to koncepcja łącząca elastyczność (flexibility) oraz bezpieczeństwo (security) na rynku pracy. Dokumenty strategiczne Unii Europejskiej wskazują, że docelowo funkcjonowanie europejskich rynków pracy będzie bazowało na modelu flexicurity. Koncepcja flexicurity łączy w sobie, dwa pozornie sprzeczne, pojęcia elastyczności i bezpieczeństwa. Opracowanie stanowi przegląd dokumentów Unii Europejskiej oraz publikacji naukowych...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Threshold Attendance under Soft-Crash Model: TAG Protocol and Markovian Analysis

    Publikacja

    - Rok 2018

    A realistic and systematic network evaluation should subsume an availability model and a failure model. We combine a "hard availability" model we call threshold attendance, whereby a certain minimum number of network elements must be present at any time, with a soft-crash failure model, whereby after experiencing a failure, a network element is still able to function correctly for a while in an emergency mode at a risk of a major...

    Pełny tekst do pobrania w portalu

  • Analysis of hydrodynamic pressure fields of motorboats and pontoons in shallow water

    Publikacja

    The article presents the results of calculations of the pressure fields generated by a motorboat at the bottom of a shallow sea. Calculations were made using the boundary elements method (BEM), arranged on the surface of the boat and the bottom of the sea. This method is described in [3], and applied on a free surface linearized boundary condition. Results for four different lengths of motorboats, from 2.85 m to 9.5 m, sea depth...

    Pełny tekst do pobrania w portalu

  • Scanning networks with cactus topology

    Publikacja
    • Ł. Wrona

    - Rok 2008

    The family of Pursuit and Evasion problems is widelystudied because of its numerous practical applications,ranging from communication protocols to cybernetic andphysical security. Calculating the search number of a graphis one of most commonly analyzed members of this problemfamily. The search number is the smallest number of mobileagents required to capture an invisible and arbitrarily fastfugitive, for instance piece of malicious...

  • Improved RSS-Based DoA Estimation Accuracy in Low-Profile ESPAR Antenna Using SVM Approach

    In this paper, we have shown how the overall performance of direction-of-arrival (DoA) estimation using lowprofile electronically steerable parasitic array radiator (ESPAR) antenna, which has been proposed for Internet of Things (IoT) applications, can significantly be improved when support vector machine (SVM) approach is applied. Because the SVM-based DoA estimation method used herein relies solely on received signal strength...

    Pełny tekst do pobrania w portalu

  • Ranking of Generation Source Locations by a Hybrid Multi-Criteria Method

    The paper presents a ranking of the locations of eight renewable energy sources (RES) made using a hybrid multi-criteria analysis method. The method is a combination of the analytical hierarchical process (AHP) method and numerical taxonomy. The considered generating sources, i.e. solar plants, biogas plants, and wind farms are sources that will significantly contribute to implementing the provisions of the energy and climate package...

    Pełny tekst do pobrania w portalu

  • (Lost) Pride and Prejudice. Journalistic Identity Negotiation Versus the Automation of Content

    Publikacja
    • J. Kreft
    • M. Boguszewicz-Kreft
    • M. Fydrych

    - Journalism Practice - Rok 2023

    The objective of our research was to broaden the knowledge regarding the relationship between the work of journalists and their professional identity, and, in particular, to identify the attitudes of this professional group towards algorithmic content creation under conditions of liminality. Previously, the implementation of the technology of algorithmic content creation by media organisations was associated primarily with financial...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Multi-functional sensor based on photonic crystal fiber using plasmonic material and magnetic fluid

    Publikacja

    - OSA Continuum - Rok 2022

    A unique highly sensitive photonic crystal fiber is investigated based on plasmonic material and magnetic fluid (MF) for the simultaneous measurement of temperature and magnetic field sensor. The designed sensor is explored by tracing the different parameters such as birefringence, coupling length, power spectrum, and the peak wavelength of the transmission intensity. The magnetic field and temperature computation are attained...

    Pełny tekst do pobrania w portalu