Filtry
wszystkich: 1281
-
Katalog
- Publikacje 975 wyników po odfiltrowaniu
- Czasopisma 108 wyników po odfiltrowaniu
- Konferencje 80 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 31 wyników po odfiltrowaniu
- Projekty 8 wyników po odfiltrowaniu
- Kursy Online 16 wyników po odfiltrowaniu
- Dane Badawcze 62 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: SECURITY CONTROLS AND MEASURES
-
Review of Cybersecurity Assessment Methods: Applicability Perspective
PublikacjaCybersecurity assessments are crucial in building the assurance that vital cyberassets are effectively protected from threats. Multiple assessment methods have been proposed during the decades of the cybersecurity field. However, a systematic literature search described in this paper reveals that their reviews are practically missing. Thus, the primary objective of this research was to fulfil this gap by comprehensively identifying...
-
Identification of Emotional States Using Phantom Miro M310 Camera
PublikacjaThe purpose of this paper is to present the possibilities associated with the use of remote sensing methods in identifying human emotional states, and to present the results of the research conducted by the authors in this field. The studies presented involved the use of advanced image analysis to identify areas on the human face that change their activity along with emotional expression. Most of the research carried out in laboratories...
-
Impact of Work on the Well-Being of Police Officers and Firefighters
PublikacjaWork is one of the most important spheres of human functioning and has a significant impact on individual overall well-being. The purpose of this study is to assess the positive and negative impact of the work of police officers and firefighters on their well-being in different spheres of life. In particular, the study examines the relationship between the type of occupation and the elements that generate a feeling of well-being,...
-
Evaluation of Professional Demands and Financial Reward Through the Perception of Police Managers
PublikacjaThe aim of the study was to examine the relationship between job demands and salary in the subjective perception of mid-level police managers. An occupational stress model in which effort spent on job demands are not balanced by the received reward, was adopted. The study comprised 51 police officers (4 women). The partial least squares method was used for the analysis, and the SmartPLS 2.0 program was applied. The income and...
-
Psychosocial risks associated with the profession of train driver
PublikacjaExcellent competencies as well as a good physical and mental health are required in train drivers’ profession. Despite the changes in the structure of employment the train drivers above 46 years and job tenure longer than 30 years are the largest group. The generation gap is becoming more pronounced, and its fulfilment will not be easy. It is related not only to training of new personnel but also promotion of healthy work environment...
-
A Review of Standards with Cybersecurity Requirements for Smart Grid
PublikacjaAssuring cybersecurity of the smart grid is indispensable for the reliable operation of this new form of the electricity network. Experts agree that standardised solutions and practices should be applied in the first place. In recent years many new standards for smart grids have been published, which paradoxically results in the difficulty of finding a relevant publication in this plethora of literature. This paper presents results...
-
Clustering Context Items into User Trust Levels
PublikacjaAn innovative trust-based security model for Internet systems is proposed. The TCoRBAC model operates on user profiles built on the history of user with system interaction in conjunction with multi-dimensional context information. There is proposed a method of transforming the high number of possible context value variants into several user trust levels. The transformation implements Hierarchical Agglomerative Clustering strategy....
-
International Journal of Computer Science and Network Security
Czasopisma -
Data visualization of marine objects on digital maps
PublikacjaThe paper presents the implementation of two multithreaded applications for data visualization of marine objects written in C#, designed to run on operator consoles with 32-bit or 64-bit Windows 7 OS. The article describes the most important functionality and features of the developed C# .NET user controls for data visualization on digital maps and in the configurable tables.
-
Folate/homocysteine metabolism and lung cancer risk among smokers
PublikacjaBackground: Folate and homocysteine are involved in DNA synthesis and methylation processes, which are deregulated during carcinogenesis. Objectives: The aim of this study was to assess the relationship between folate/homocysteine concentrations, the functional polymorphisms of folate/homocysteine genes and lung cancer risk among cigarette smokers. Study design: The study included 132 lung cancer patients and 396 controls from...
-
Selected adipocytokines in patients with an incidentally discovered pheochromocytoma
PublikacjaBACKGROUND: Adipose tissue secretes many adipokines and cytokines, which may be an additional risk factor of cardiovascular and metabolic diseases in patients with an incidentally discovered pheochromocytoma (PHEO). The aim of the study was to investigate levels of selected adipocytokines in these patients. METHODS: This prospective study included 12 patients with an incidentally discovered PHEO and 18 healthy participants. In...
-
Usable Security and Privacy (Usable Security Workshop)
Konferencje -
CARDIOVASCULAR RISK FACTORS AMONG POLISH EMPLOYEES OF UNIFORMED SERVICES
PublikacjaObjectives: Employees of uniformed services (EoUS) were screened for cardiovascular risk factors. Material and Methods: A total of 1138 EoUS (age M±SD 49.9±6.0 years) and 263 controls (age M±SD 54.4±9.7 years) under the care of the cardiology clinic in Gdańsk, Poland,were included in the study. Medical history and blood samples were collected, and a physical examination was performed. Ten-year cardiovascular risk of death was...
-
The methods of secure data transmission in the KNX system
PublikacjaThe article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.
-
Zarządzanie bezpieczeństwem informacji - specjalność ISI -2022
Kursy OnlineThe aim of the course is for a student to develop the understanding of terminology, objectives and scope of information security management and privacy management and to learn about related assurance and assessment methods.
-
Zarządzanie bezpieczeństwem informacji - specjalność ISI -2023
Kursy OnlineThe aim of the course is for a student to develop the understanding of terminology, objectives and scope of information security management and privacy management and to learn about related assurance and assessment methods.
-
Zarządzanie bezpieczeństwem informacji - specjalność ISI -2024
Kursy OnlineThe aim of the course is for a student to develop the understanding of terminology, objectives and scope of information security management and privacy management and to learn about related assurance and assessment methods.
-
Income obtained according to particular rates only by taxpayers conducting non-agricultural business activity 2015
Dane BadawczeTaxation in the form of a lump sum on recorded revenues does not apply to certain types of activity, regardless of their size. We are talking about taxpayers who achieve revenue in whole or in part, among others from on account of running pharmacies, activities in the field of buying and selling foreign exchange values, activities in the field of trade...
-
Nonlinear FEM 2D failure onset prediction of composite shells based on 6-parameter shell theory
PublikacjaWithin the framework of the nonlinear 6-parameter shell theory with the drilling rotation and asymmetric stress measures, the modifications of Tsai-Wu and Hashin laminate failure initiation criteria are proposed. These improvements enable to perform first ply failure estimations taking into account the non-symmetric stress measures. In order to check the validity of the proposed criteria, finite element analyses are performed with...
-
Validation of a virtual test environment for C2X communication under radio jamming conditions
PublikacjaIn this paper, we propose a novel car-2-x communication security testing methodology in the physical layer of wireless systems. The approach is dedicated to automated testing of autonomous vehicles and it is essential for such complex systems operation, especially with regard to safety and security issues. It is based on scenario-driven testing in virtual and real test environments created from collected or simulated data. The...
-
Michal Piechowicz dr
OsobyAdjunct at the Department of European Studies at the Faculty of Political Science and Security Studies. Doctoral thesis defended in 2011. Author of publications in the field of European integration and security. Research interests focus on issues related to the decision-making processes and EU defense and security policy issues. I'm visiting the CEEs constantly. My ongoing and future-oriented goal is establishing research and trust-based...
-
Use of a wastewater recovery product (struvite) to enhance subtropical seagrass restoration
PublikacjaSeagrasses are in decline worldwide, and their restoration is relatively expensive and unsuccessful compared to other coastal systems. Fertilization can improve seagrass growth in restoration but can also release nutrients and pollute the surrounding ecosystem. A slow-release fertilizer may reduce excessive nutrient discharge while still providing resources to the seagrass's rhizosphere. In this study, struvite (magnesium ammonium...
-
International Journal of Security, Privacy an d Trust Management
Czasopisma -
Analiza danych osobowych przetwarzanych w systemach telekomunikacyjnych klasy IP PBX oraz metod ich anonimizacji za pomocą systemów SBC
PublikacjaOpisano wyniki realizacji pracy, dotyczącej analizy systemu telekomunikacyjnego, opartego na technologii VoIP, pod względem wymagań prawnych powstałych wraz z wejściem w życie przepisów Ogólnego Rozporządzenia o Ochronie Danych Osobowych (RODO). Przedstawiono wyniki analizy przykładowego systemu IP PBX Asterisk oraz wykorzystywanego w nim protokołu sygnalizacyjnego SIP, w kontekście przetwarzania danych osobowych, a także metody...
-
Role of quantitative chest perfusion computed tomography in detecting diabetic pulmonary microangiopathy
PublikacjaAims: Aimof the study was to determine the role of perfusion chest computed tomography(pCT) in evaluation of pulmonary diabetic angiopathy.Methods: 18 never-smoking patients (10 diabetic patients and 8 healthy controls) underwentchest high resolution CT (HRCT) and then pCT scanning. In both groups, blood tests,biochemical analysis, fibrinogen, HbA1c, spirometry, diffusion capacity for carbonmonoxide(DLCO) and body pletysmography...
-
SVC and power transformers controllers coordination
PublikacjaThe use of shunt compensators such as FACTS (for example SVC) in power systems gives possibility of fast and flexible control of voltage or reactive power. An efficient cooperation between a transformer and compensator connected to busbars, or transformer’s tertiary winding, requires a proper coordination of controls. The article contains theoretical considerations and simulation results which indicate that such co-ordination is...
-
Liquid residence time in vortex separators
PublikacjaCentrifugal force enhances gravitational separation of suspension (vortex separators), as well as allows regulation of liquid discharge (vortex flow controls). Furthermore, it elongates the effective residence time of liquid inside the chamber in comparison to non-circulative flow. Laboratorz measurements, described in the paper, indicate that average liquid residence time for circulative flow exceeds 50% of plug-flow time,...
-
Mechanizmy bezpieczeństwa transmisji w systemie netBaltic
Publikacjaartykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Internal legal acts of technical and medical universities in Poland regulating classes conducted in-person during the Covid-19 pandemic
Dane BadawczeA database of legal acts and other internal documents of medical and technical universities in Poland regulating the way of organizing in-person or hybrid classes during the COVID-19 pandemic from the summer semester 2019/2020 to the winter semester 2020/2021.Documents were encoded in two separate coding systems using the MAXQDA program for qualitative...
-
Local Planning - Summer 2024
Kursy OnlineLocal Planning, Spatial Management Course focuses on the practical aspects of the local planning both spatial and communal. Topics such as policy measures and tools used by the local government to guide provision of the local services and planning will be discussed. The course is complementary to 'Comprehensive Planning'. Course is delivered in English.
-
Feature extraction in detection and recognition of graphical objects
PublikacjaDetection and recognition of graphic objects in images are of great and growing importance in many areas, such as medical and industrial diagnostics, control systems in automation and robotics, or various types of security systems, including biometric security systems related to the recognition of the face or iris of the eye. In addition, there are all systems that facilitate the personal life of the blind people, visually impaired...
-
Architektura bezpieczeństwa systemu netBaltic
PublikacjaW artykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Results from a Genome-Wide Association Study (GWAS) in Mastocytosis Reveal New Gene Polymorphisms Associated with WHO Subgroups
PublikacjaMastocytosis is rare disease in which genetic predisposition is not fully understood. The aim of this study was to analyze associations between mastocytosis and single nucleotide polymorphisms (SNPs) by a genome-wide association study (GWAS) approach. A total of 234 patients were enrolled in our study, including 141 with cutaneous mastocytosis (CM; 78 children and 63 adults) and 93 with systemic mastocytosis (SM, all adults)....
-
Kontekstowo zorientowany model bezpieczeństwa systemów internetowych
PublikacjaW rozprawie dokonano analizy usługowych systemów internetowych pod względem bezpieczeństwa. Przedstawiono autorskie uniwersalne modele bezpieczeństwa CoRBAC oraz jego rozszerzenie TCoRBAC, będące rozwinięciem tradycyjnego modelu RBAC. Uwzględniono analizę szeroko rozumianego kontekstu funkcjonowania systemu oraz poziom jego zaufania do użytkownika. Opracowano metodę wyznaczania dwóch parametrów: zaufania do systemu (λ) będącego...
-
New RFID readers for scalable RFID system
PublikacjaRFID systems gives the opportunity to have wide access control integrated with the monitoring of people and goods flow. System's scalability is one of the most important features in such systems as they enable large scale deployments. The concept of the proposed reader's architecture employs new RFID transceivers and microcontrollers, security algorithms which gives very high functionality at low price. Special treatment of system's...
-
Simulating Malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Conjectured strong complementary-correlations tradeoff
PublikacjaWe conjecture uncertainty relations that restrict correlations between the results of measurements performed by two separate parties on a shared quantum state. The first uncertainty relation bounds the sum of two mutual informations when one party measures a single observable and the other party measures one of two observables. The uncertainty relation does not follow from the Maassen-Uffink uncertainty relation and is much stronger...
-
Usenix Security Symposium
Konferencje -
Information Security Symposium
Konferencje -
International Workshop on Security
Konferencje -
Information Security Conference
Konferencje -
Conference on RFID Security
Konferencje -
Mechanizmy bezpieczeństwa w strefie C systemu netBaltic
PublikacjaW artykule zaprezentowano rozwiązania zaimplementowane do zabezpieczania komunikacji w warunkach sporadycznej i nieciągłej łączności (Delay Tolerant Networking – DTN) w systemie netBaltic - charakterystycznej dla strefy C tego systemu. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych, architektura bezpieczeństwa całego systemu została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI),...
-
Threat/risk assessment tool to assess vulnerability of Polish cities to Russian attacks
Publikacja -
Klasyfikacja wyrobów tytoniowych z wykorzystaniem elektronicznych nosów
PublikacjaZapobieganie nielegalnej dystrybucji wyrobów tytoniowych w Polsce stanowi poważny problem. Wyroby tytoniowe przemycane do Polski mogą charakteryzować się niższą jakością, wynikającą z wykorzystania surowców gorszego gatunku. Jednym z rozwiązań zmniejszających skalę tego problemu mogą być działania ograniczające przemyt przez granice państwa. Autorzy pracy uważają, że wykorzystanie elektronicznych nosów do rutynowych kontroli przewożonych...
-
Influence of the Spectral Quality of Light on Daytime Alertness Levels in Humans
PublikacjaExposure to light is very important for human health. However, the characteristics of the light stimulus and the appropriate timing of such exposure are essential. Studies that have used monochromatic light exposure have shown no systematic patterns for the effects of blue light compared to longer wavelengths. Previous studies have shown that red light exposure increases objective and subjective measures of alertness at night without...
-
WIKI-WS as a C2 NIWA Web Service Management Platform
PublikacjaThe Wiki-WS platform was implemented within the C2 NIWA project for production purposes. Wiki-WS stands for developing, managing and maintaining web services. The production deployment needed implementation of several functional improvements and establishing a strong security 7 safety policy. The WikiWS platform has to be used as an educational environmement for developing web sevices and production environment for execution of...
-
Piotr Grudowski dr hab. inż.
OsobyDr hab. inż. Piotr Grudowski, profesor w Politechnice Gdańskiej karierę naukową rozpoczynał na Wydziale Mechanicznym Technologicznym Politechniki Gdańskiej w zespole „Inżynierii Jakości i Metrologii”. Stopień doktora nauk technicznych w dyscyplinie budowa i eksploatacja maszyn uzyskał w roku 1993 na Wydziale Mechanicznym PG a stopień doktora habilitowanego nauk ekonomicznych, w dyscyplinie nauk o zarządzaniu, w 2008 roku na Wydziale...
-
Plasma free amino acid profiling as metabolomic diagnostic and prognostic biomarker in paediatric cancer patients: a follow‑up study
PublikacjaAmino acids (AAs) play a crucial role in cancer cell metabolism. Levels of 22 plasma AAs at the time of diagnosis and after treatment were established among 39 pediatric cancer patients and 33 healthy children. Glutamic acid levels decreased and tryptophan levels increased during treatment. Cancer patients presented significantly lower levels of glutamine and leucine post-treatment while levels of 12 other AAs were higher comparing...