Filtry
wszystkich: 25223
-
Katalog
- Publikacje 3451 wyników po odfiltrowaniu
- Czasopisma 437 wyników po odfiltrowaniu
- Konferencje 243 wyników po odfiltrowaniu
- Wydawnictwa 2 wyników po odfiltrowaniu
- Osoby 238 wyników po odfiltrowaniu
- Projekty 17 wyników po odfiltrowaniu
- Zespoły Badawcze 1 wyników po odfiltrowaniu
- Kursy Online 122 wyników po odfiltrowaniu
- Wydarzenia 4 wyników po odfiltrowaniu
- Dane Badawcze 20708 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: COST OF INFORMATION SECURITY
-
Resolving conflicts in object tracking for automatic detection of events in video
PublikacjaW referacie przedstawiono algorytm rozwiązywania konfliktów w śledzeniu obiektów ruchomych. Proponowana metoda wykorzystuje predykcję stanu obiektu obliczaną przez filtry Kalmana oraz dopasowuje wykryte obiekty do struktur śledzących ich ruch na podstawie deskryptorów koloru i tekstury. Omówiono specyficzne sytuacje powodujące konflikty, takie jak rozdzielanie obiektów. Przedstawiono wyniki testów. Algorytm może być zastosowany...
-
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublikacjaAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
Concept of Multifactor Method and Non-Functional Requirements Solution to Increase Resilience through Functional Safety with Cybersecurity Analysis
PublikacjaIn the process of designing safety systems, an integrated approach in safety and cybersecurity analysis is necessary. The paper describes a new technique of increasing resilience through integrated analysis of functional safety and cybersecurity. It is a modeling methodology based on the combination of the multifactor method utilizing modified risk graphs, used previously for Safety Integrity Level (SIL) assessment, and the Non-Functional...
-
Realistic noise-tolerant randomness amplification using finite number of devices
PublikacjaRandomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublikacjaFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
Trustworthy Applications of ML Algorithms in Medicine - Discussion and Preliminary Results for a Problem of Small Vessels Disease Diagnosis.
PublikacjaML algorithms are very effective tools for medical data analyzing, especially at image recognition. Although they cannot be considered as a stand-alone diagnostic tool, because it is a black-box, it can certainly be a medical support that minimize negative effect of human-factors. In high-risk domains, not only the correct diagnosis is important, but also the reasoning behind it. Therefore, it is important to focus on trustworthiness...
-
Applications of semi-definite optimization in quantum information protocols
PublikacjaThis work is concerned with the issue of applications of the semi-definite programming (SDP) in the field of quantum information sci- ence. Our results of the analysis of certain quantum information protocols using this optimization technique are presented, and an implementation of a relevant numerical tool is introduced. The key method used is NPA discovered by Navascues et al. [Phys. Rev. Lett. 98, 010401 (2007)]. In chapter...
-
Simple and low-cost wireless voting system
PublikacjaThis paper presents the concept of a simple and low-cost wireless voting system working on the 868 MHz frequency band. Described system is dedicated to general shareholders assemblies but it can be easily adapted for other applications. The main advantage is its simplicity and mobility as it consists solely of three components - voting modules, base station and a PC application from which the whole system is managed. This architecture...
-
Simple and low-cost wireless voting system
PublikacjaThis paper presents the concept of a simple and low-cost wireless voting system working in the 868 MHz frequency band. The described system is dedicated to general shareholders assemblies but it can be easily adapted for other applications. The main advantage is its simplicity and mobility as it consists solely of three components - voting modules, a base station and a PC application from which the whole system is mamaged. This...
-
Gender, equality, science and information systems
PublikacjaIn the entire Europe more women than men graduate from tertiary education institutes1. However, they are underrepresented in scientific and engineering disciplines. Women researchers still constitute a minority in the Government and Higher Education Sectors that both are related to power. A number of industry reports highlight a low number of women in IT occupations2. The EU Member States have, on political levels, committed themselves...
-
Hybrid model of the evolution of information technology support organisation
PublikacjaPrzedstawiono etapy budowy, weryfikacji i implementacji hybrydowego rozmytego modelu ewolucji organizacji wspomagania IT (information technology).
-
Towards Universal Visualisation of Emotional States for Information Systems
PublikacjaThe paper concerns affective information systems that represent and visualize human emotional states. The goal of the study was to find typical representations of discrete and dimensional emotion models in terms of color, size, speed, shape, and animation type. A total of 419 participants were asked about their preferences for emotion visualization. We found that color, speed, and size correlated with selected discrete emotion...
-
Low cost set-up for supercapacitors parameters evaluation
PublikacjaSupercapacitors are capable to store relatively high amount of energy comparing to its mass. Growing number of these devices applications requires development of new testing methods. Standard methods of evaluation of supercapacitor parameters, as cycling voltammetry, CV, galvanostatic cycling with potential limitation, GCPL, impedance measurements, require equipment of high cost...
-
Information Systems, Business and Law - Lessons Learnt
PublikacjaReferat prezentuje badania na styku wytwarzania systemów informatycznych, procesów biznesowych i powiązanych z nimi regulacji prawnych. Zawiera on opis doświadczeń wynikających z zastosowania zintegrowanej metody analizy technicznej i prawnej podczas wytwarzania systemu ochrony własności intelektualnej. Przedstawione doświadczenia i powiązane analizy mogą być przydatne podczas tworzenia taksonomii zagadnień na styku systemów informatycznych,...
-
Low cost microwave X-band generator
PublikacjaA low cost microwave X-band generator for educational purposes was designed and built. Its simple construction and user's interface makes it suitable for a student laboratory.The generator is based on a single frequency conversion concept. It uses a digitally tunable PLL chip for intermediate frequency generation and an active frequency multiplier for frequency conversion. The generator covers 9,7 - 11 GHz part of the X frequency...
-
The EU's Cyber Security Strategy
Publikacja -
Plant Biotechnology in Food Security
Publikacja -
On some aspects of maritime security
PublikacjaZostały przedstawione wybrane zagadnienia dotyczące ochrony żeglugi, w tym opisano Międzynarodowy Kodeks Ochrony Statków i Urządzeń Portowych - ISPS, Statkowy System Alarmowania (SSAS) oraz system AIS i System Identyfikacji i Śledzenia Dalekiego Zasięgu (LRIT). Przedstawiono również znaczenie nowoczesnej telekomunikacji dla potrze sprawnej ochrony żeglugi na morzach i oceanach
-
Information Retrieval in Wikipedia with Conceptual Directions
PublikacjaThe paper describes our algorithm used for retrieval of textual information from Wikipedia. The experiments show that the algorithm allows to improve typical evaluation measures of retrieval quality. The improvement of the retrieval results was achieved by two phase usage approach. In first the algorithm extends the set of content that has been indexed by the specified keywords and thus increases the Recall value. Then, using the...
-
On the low-cost design of abbreviated multisection planar matching transformer
PublikacjaA numerically demanding wideband matching transformer composed of three nonuniform transmission lines (NUTLs) has been designed and optimized at a low computational cost. The computational feasibility of the design has been acquired through the exploitation of low-fidelity NUTL models in most steps of the design procedure and an implicit space mapping optimization engine, providing high accuracy results with only a handful of EM...
-
Conception of interactive information and decision support system - model and evaluation
PublikacjaThis article presents conception of interactive information and decision support system for urban and industrial air quality management. The emphasis of the project is on real-time analysis and multi-media information, and support of distributed and mobile clients through the Internet.
-
[soft skills] Scientific databases and information skills
Kursy Online{mlang pl} Dyscyplina: wszystkie dyscypliny Zajęcia obowiązkowe dla doktorantów I roku Prowadzący: Liczba godzin: 5 Forma zajęć: wykład {mlang} {mlang en} Discipline: all disciplines Obligatory course for 1st-year PhD students Academic teacher: Total hours of training: 5 teaching hours Course type: lecture {mlang} Soft skills Area II - researcher's workshop "Scientific databases and information skills" The training...
-
Multiobjective Water Distribution Systems Control of Pumping Cost, Water Quality, and Storage-Reliability Constraints
PublikacjaThis work describes a multiobjective model for trading-off pumping cost and water quality for water distribution systems operation. Constraints are imposed on flows and pressures, on periodical tanks operation, and on tanks storage. The methodology links the multiobjective SPEA2 algorithm with EPANET, and is applied on two example applications of increasing complexity, under extended period simulation conditions and variable energy...
-
Follow the Light. Where to search for useful research information
PublikacjaArchitectural Lighting Design (ALD) has never been a standalone professional discipline. Rather, it has existed as the combination of art and the science of light. Today, third generation lighting professionals are already creatively intertwining these fields, and the acceleration in scientific, technological and societal studies has only increased the need for reliable multidisciplinary information. Therefore, a thorough re-examination...
-
Sources of Market Information, Its Quality and New Product Financial Performance
PublikacjaWhile we observe a growing interest in the role of market information in new product development (NPD), existing research has still largely ignored the quality of market information that is a crucial issue in the era of the information society. What does affect the quality of market information in new product development projects, and how does this quality influence the financial performance of new products? In this paper, we address...
-
Potential applicability of ontologies for the evaluation of information technology
PublikacjaIn this article we present the possibilities of using ontologies as a part of a multi-agent system (MAS) designed for the evaluation of information technologies. This is a part of a broader idea devel-oped by the team of researchers at Gdańsk University of Technology. The article deals with defining ontologies, presenting main technologies for their design and implementation and proposes, initially, domains of the ontologies' interest...
-
Model of management of knowledge bases in the information technology evaluation environment
PublikacjaThe paper presents the model of management of knowledge bases in multi-agent system for evaluation of information technologies (IT_MAS). Such system is being developed in Gdansk Uni-versity of Technology by Information Technology Management Team. Multi-agent system is supposed to support manager level specialists during decision processes when there is identified need to buy or change any information technology. The main goal of...
-
Low-Cost Automated Design of Compact Branch-Line Couplers
PublikacjaBranch-line couplers (BLCs) are important components of wireless communication systems. Conventional BLCs are often characterized by large footprints which make miniaturization an important prerequisite for their application in modern devices. State-of-the-art approaches to design of compact BLCs are largely based on the use of high-permittivity substrates and multi-layer topologies. Alternative methods involve replacement of transmission-line...
-
The Technological Advancement of New Products, Product Newness and Market Information
PublikacjaThe purpose of this study is to propose product newness and obtaining market information as mediators of the relationship between the technological advancement of a new product and its commercial success. So far, little is known about the mediators of this relationship but knowledge about the factors that strengthen or weaken it is valid, both for the theory and practice of new product management. On the one hand, product newness...
-
Domain segmentation for low-cost surrogate-assisted multi-objective design optimisation of antennas
PublikacjaAbstract: Information regarding the best possible design trade-offs of an antenna structure can be obtained through multiobjective optimisation (MO). Unfortunately, MO is extremely challenging if full-wave electromagnetic (EM) simulation models are used for performance evaluation. Yet, for the majority of contemporary antennas, EM analysis is the only tool that ensures reliability. This study introduces a procedure for accelerated...
-
Information Retrieval with the Use of Music Clustering by Directions Algorithm
PublikacjaThis paper introduces the Music Clustering by Directions (MCBD) algorithm. The algorithm is designed to support users of query by humming systems in formulating queries. This kind of systems makes it possible to retrieve songs and tunes on the basis of a melody recorded by the user. The Music Clustering by Directions algorithm is a kind of an interactive query expansion method. On the basis of query, the algorithm provides suggestions...
-
Regional observatory as a part of road safety information system
PublikacjaEU experience clearly indicates that it is necessary to inform and motivate the public on road unsafety to undertake specific preventive efforts, as well as making road users feel responsible for the state of road safety and seek to improve this state gradually to protect their health and life. The implementation of the Warmia-Mazury Road Safety Observatory project will not only be an excellent addition to the activities carried...
-
Information retrieval with semantic memory model
PublikacjaPsycholinguistic theories of semantic memory form the basis of understanding of natural language concepts. These theories are used here as an inspiration for implementing a computational model of semantic memory in the form of semantic network. Combining this network with a vector-based object-relation-feature value representation of concepts that includes also weights for confidence and support, allows for recognition of concepts...
-
Cost-Efficient Optical Fronthaul Architectures for 5G and Future 6G Networks
PublikacjaFifth-generation and Beyond (5GB) wireless networks have introduced new centralized architectures such as cloud radio access network (CRAN), which necessitate extremely high-capacity low latency Fronthaul (FH). CRAN has many advantageous features in terms of cost reduction, performance enhancement, ease of deployment, and centralization of network management. Nevertheless, designing and deploying a cost-efficient FH is still a...
-
[15.02.2024] Information meeting for 2nd year PhD students
Kursy OnlineInformation meeting on 15.02.2024 2nd year PhD students
-
COMPREHENSIVE MODELLING OF THE COST EFFECTIVNESS OF RAILWAY LINE ELECTRIFICATION
PublikacjaSubject of this paper is the mathematical model estimating the Economical threshold between usage of combustion engine traction and electrical traction for new and modernized railway passenger communication lines. Currently available models do not coincide with the whole complexity of the problem. The proposed model was implemented into Matlab and then validated on “Pomorska Kolej Metropolitalna” investment time-frame and its cost...
-
Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej – wymagania i kryteria
PublikacjaNiniejsza praca poświęcona jest zagadnieniom zarządzania bezpieczeństwem funkcjonalnym w cyklu życia z uwzględnieniem norm międzynarodowych PN-ENIEC 61508 i PN-ENIEC 61511 oraz zarządzaniu bezpieczeństwem informacji w systemach i sieciach komputerowych w nawiązaniu do wytycznych OECD i wymagań normy PN-ISO/IEC 27001. Rozważa się przykłady skupionych i rozproszonych sieci komputerowych pełniących funkcje monitorowania, sterowania...
-
Comparison of state feedback and PID control of pressurizer water level in nuclear power plant
PublikacjaThe pressurizer water level control system in nuclear power plant with pressurized water reactor (PWR) is responsible for coolant mass balance. The main control goal is to stabilize the water level at a reference value and to suppress the effect of time-varying disturbances (e.g. coolant leakage in primary circuit pipeline system). In the process of PWR power plant operation incorrect water level may disturb pressure control or...
-
Multimodal Surveillance Based Personal Protection System
PublikacjaA novel, multimodal approach for automatic detection of abduction of a protected individual, employing dedicated personal protection device and a city monitoring system is proposed and overviewed. The solution is based on combining four modalities (signals coming from: Bluetooth, fixed and PTZ cameras, thermal camera, acoustic sensors). The Bluetooth signal is used continuously to monitor the protected person presence, and in case...
-
Threshold Attendance under Soft-Crash Model: TAG Protocol and Markovian Analysis
PublikacjaA realistic and systematic network evaluation should subsume an availability model and a failure model. We combine a "hard availability" model we call threshold attendance, whereby a certain minimum number of network elements must be present at any time, with a soft-crash failure model, whereby after experiencing a failure, a network element is still able to function correctly for a while in an emergency mode at a risk of a major...
-
Flexicurity. Elastyczność i bezpieczeństwo
PublikacjaFlexicurity to koncepcja łącząca elastyczność (flexibility) oraz bezpieczeństwo (security) na rynku pracy. Dokumenty strategiczne Unii Europejskiej wskazują, że docelowo funkcjonowanie europejskich rynków pracy będzie bazowało na modelu flexicurity. Koncepcja flexicurity łączy w sobie, dwa pozornie sprzeczne, pojęcia elastyczności i bezpieczeństwa. Opracowanie stanowi przegląd dokumentów Unii Europejskiej oraz publikacji naukowych...
-
On extending open source IMS platform for integrated IPTV and VoIP services over IPv6
PublikacjaEven when IMS is the most popular platform for multimedia services, the open versions of IMS ecosystem are lacking in specified functionalities for IPTVv6 and VoIPv6 services. In this paper, we extend current client and server open source software in order to provide reliability and security to these multimedia services. As a part of our work the IMS architecture for conferencing system with proposed mechanisms to improve system...
-
A Triplet-Learnt Coarse-to-Fine Reranking for Vehicle Re-identification
PublikacjaVehicle re-identification refers to the task of matching the same query vehicle across non-overlapping cameras and diverse viewpoints. Research interest on the field emerged with intelligent transportation systems and the necessity for public security maintenance. Compared to person, vehicle re-identification is more intricate, facing the challenges of lower intra-class and higher inter-class similarities. Motivated by deep...
-
Implementation of integrated control In drinking water distribution systems - IT system proposal
PublikacjaImplementation of integrated control algorithms requires suitable hardware and software platforms. Proposed solution must allow realizing control and monitoring tasks, while ensuring high reliability and security of processed data. Additionally, the software and hardware solutions must be immune to outside influence. This paper presents an approach to implementation of control systems in drinking water distribution system. Presented...
-
Architecture of Request/Response and Publish/Subscribe System Capable of Processing Multimedia Streams
PublikacjaAnaliza ''w locie'' (ang. on-the-fly) strumieni multimedialnych, zawierających wysokiej jakości dane obrazu i dźwięku, wciąż stanowi wyzwanie dla projektantów oprogramowania. Praca przedstawia architekturę systemu zdolnego do przetwarzania w czasie rzeczywistym strumieni multimedialnych przy użyciu komponentów działających w architekturze Publish/Subscribe oraz Request/Response, korzystających z możliwości Java Multimedia Framework...
-
Integrating web site services into application through user interface
PublikacjaThe issue of integrating applications which are only accessible through visual user interface is not thoroughly researched. Integration of web applications running remotely and controlled by separate organizations becomes even more complicated, as their user interface can display differently in different browsers or change without prior notification as a result of application maintenance. While possible, it is generally not common...
-
Assembling and testing of quasi-static hybrid piezoelectric motor based on electroactive lubrication principle
PublikacjaThe presented paper concerns a novel concept of hybrid piezoelectric motor based on electroactive lubrication principle. Its structure is combined of quasi-static and resonance piezoelectric actuators, synchronizing their work to generate the rotary movement. The hybrid motor topology is compared to the existing piezoelectric motors, regarding its field of applications in embedded systems with very high security requirements. The...
-
Algorithms of chemicals detection using raman spectra
PublikacjaRaman spectrometers are devices which enable fast and non-contact identification of examined chemicals. These devices utilize the Raman phenomenon to identify unknown and often illicit chemicals (e.g. drugs, explosives)without the necessity of their preparation. Now, Raman devices can be portable and therefore can be more widely used to improve security at public places. Unfortunately, Raman spectra measurements is a challenge...
-
Analysis of hydrodynamic pressure fields of motorboats and pontoons in shallow water
PublikacjaThe article presents the results of calculations of the pressure fields generated by a motorboat at the bottom of a shallow sea. Calculations were made using the boundary elements method (BEM), arranged on the surface of the boat and the bottom of the sea. This method is described in [3], and applied on a free surface linearized boundary condition. Results for four different lengths of motorboats, from 2.85 m to 9.5 m, sea depth...
-
Assurance Case Patterns On-line Catalogue
PublikacjaAssurance case is an evidence-based argument demonstrating that a given property of a system (e.g. safety, security) is assured. Assurance cases are developed for high integrity systems, as in many industry domains such argu-ment is explicitly required by regulations. Despite the fact that each assurance case is unique, several reusable argument patterns have been identified and pub-lished. This paper reports work on development...