Filtry
wszystkich: 574
-
Katalog
Wyniki wyszukiwania dla: security systems
-
The Effectiveness of Basic Resuscitation Activities Carried out by Combat Paramedics of the Police, as Exemplified by Polish Counterterrorist Units
PublikacjaThe tasks carried out by Police officers are often accompanied by dangerous situations that threaten the life and health of the people involved, the police themselves, and bystanders. It concerns especially counter-terrorism police units whose activities are aimed at terrorists and particularly dangerous criminals, and their course is violent and aggressive. In conjunction with the inability to bring civilian rescue services into...
-
Review of Cybersecurity Assessment Methods: Applicability Perspective
PublikacjaCybersecurity assessments are crucial in building the assurance that vital cyberassets are effectively protected from threats. Multiple assessment methods have been proposed during the decades of the cybersecurity field. However, a systematic literature search described in this paper reveals that their reviews are practically missing. Thus, the primary objective of this research was to fulfil this gap by comprehensively identifying...
-
International Journal of Computer Science and Network Security
Czasopisma -
System of monitoring of the Forest Opera in Sopot structure and roofing
PublikacjaThe authors present a solution realized in Forest Opera (name in Polish: Opera Leśna) in Sopot (Poland) in connection with the modernization and construction of a new roof. The complicated structure of the roof of the facility and the used covering in form of membrane made of technical fabric required (for security reasons) to install the unit of devices allowing for the continuous geodetic monitoring of the facility. Monitoring...
-
Bartosz Sawik
OsobyDr Bartosz Sawik is a Professor at the Department of Business Informatics and Engineering Management, AGH University of Science and Technology, Krakow, Poland and at the Institute of Smart Cities, GILT-OR Group, Department of Statistics, Computer Science and Mathematics, Public University of Navarre, Pamplona, Spain. He is a Visiting Researcher at the University of California, Berkeley, USA. He has a Ph.D. and a M.Sc. and Eng....
-
Analizy ilości i jakości odpływu wód deszczowych i roztopowych z kontrolowanej zlewni zurbanizowanej
PublikacjaIstotnym problemem Gdańska staje się bezpieczeństwo ekologiczne związane ze spływami miejskimi odprowadzanymi bezpośrednio do wód powierzchniowych, często akwenów użyteczności publicznej. W latach 2011÷2013, Katedra Hydrotechniki Wydziału Inżynierii Lądowej i Środowiska Politechniki Gdańskiej, we współpracy z Wojewódzkim Funduszem Ochrony Środowiska i Gospodarki Wodnej w Gdańsku oraz Gdańskimi Melioracjami, podjęła się wdrożenia...
-
Marek Czachor prof. dr hab.
Osoby -
Influence of Thermal Imagery Resolution on Accuracy of Deep Learning based Face Recognition
PublikacjaHuman-system interactions frequently require a retrieval of the key context information about the user and the environment. Image processing techniques have been widely applied in this area, providing details about recognized objects, people and actions. Considering remote diagnostics solutions, e.g. non-contact vital signs estimation and smart home monitoring systems that utilize person’s identity, security is a very important factor....
-
Wpływ barier ochronnych na poziom bezpieczeństwa ruchu drogowego
PublikacjaWypadki drogowe wciąż stanowią znaczną przyczynę zgonów, dlatego bardzo ważnym jest odpowiednie kształtowanie otoczenia drogi – by mogło ono uzyskać miano „wybaczającego”. Artykuł stanowi wprowadzenie do tematyki drogowych barier ochronnych, i jest częścią pracy dyplomowej realizowanej na Politechnice Gdańskiej, w ramach której autorzy analizują zależności pomiędzy wypadkami a omawianymi urządzeniami BRD. W artykule przedstawiono...
-
Koncepcja zdalnego sterowania i monitoringu urządzeń trakcyjnych z wykorzystaniem technologii teleinformatycznych
PublikacjaAdvancement in wireless communication enables engineers to apply sophisticated and relatively inexpensive technologies in new fields of industry, which were previously designated solely to wire-based solutions. One of those fields is railway transportation system. In effect of a high reliability and safety demands, this area was resistive to new technologies. Nowadays, increased security and reliability of wireless sensor networks...
-
Theory and implementation of a virtualisation level Future Internet defence in depth architecture
PublikacjaAn EU Future Internet Engineering project currently underway in Poland defines three parallel internets (PIs). The emerging IIP system (IIPS, abbreviating the project’s Polish name), has a four-level architecture, with level 2 responsible for creation of virtual resources of the PIs. This paper proposes a three-tier security architecture to address level 2 threats of unauthorised traffic injection and IIPS traffic manipulation...
-
International Journal of Security, Privacy an d Trust Management
Czasopisma -
Threat/risk assessment tool to assess vulnerability of Polish cities to Russian attacks
Publikacja -
WIKI-WS as a C2 NIWA Web Service Management Platform
PublikacjaThe Wiki-WS platform was implemented within the C2 NIWA project for production purposes. Wiki-WS stands for developing, managing and maintaining web services. The production deployment needed implementation of several functional improvements and establishing a strong security 7 safety policy. The WikiWS platform has to be used as an educational environmement for developing web sevices and production environment for execution of...
-
Signatures and acoustic images of objects moving in water
PublikacjaObservation of underwater space is part of a generaltrend, which primary purpose is to protect and increasesafety in the selected area. The basic aim of the paper ispresentation of designated acoustic characteristics typicalfor objects moving on the water surface and under water,which represent some knowledge about detection of theseobjects. Create a catalog of acoustic signature and not onlyacoustic, as well as acoustic images...
-
Unraveling Luminescent Energy Transfer Pathways: Futuristic Approach of Miniature Shortwave Infrared Light-Emitting Diode Design
Dane BadawczePhosphor-converted shortwave infrared phosphor light-emitting diodes (pc-SWIR LEDs, 900–1700 nm) are promising next-generation portable light sources for spectroscopy, security, optical communication, and medical applications. A typical design strategy involves energy transfer from Cr3+ to Ni2+, and thus, energy transfer from Cr3+–Cr3+ pairs to Ni2+...
-
Device-independent quantum key distribution based on measurement inputs
PublikacjaWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
Facilitating free travel in the Schengen area—A position paper by the European Association for Biometrics
PublikacjaDue to migration, terror-threats and the viral pandemic, various EU member states have re-established internal border control or even closed their borders. European Association for Biometrics (EAB), a non-profit organisation, solicited the views of its members on ways which biometric technologies and services may be used to help with re-establishing open borders within the Schengen area while at the same time mitigating any adverse...
-
Choosing the Right Cybersecurity Solution: A Review of Selection and Evaluation Criteria
PublikacjaInformation technologies evolve continuously reaching pioneering areas that bring in new cybersecurity challenges. Security engineering needs to keep pace with the advancing cyberthreats by providing innovative solutions. At the same time, the foundations that include security and risk assessment methodologies should remain stable. Experts are offered with an extensive portfolio of solutions and an informed choice of a particular...
-
The role of rewards and demands in burnout among surgical nurses
PublikacjaObjective: Job rewards have both, an intrinsic and an extrinsic motivational potential, and lead to employees’ development as well as help them to achieve work goals. Rewards can balance job demands and protect from burnout. Due to changes on the labour market, new studies are needed. The aim of our study was to examine the role of demands and individual rewards (and their absence) in burnout among surgical nurses. Materials and...
-
THE INVESTMENT ENVIRONMENT MANAGEMENT SYSTEM IN THE FRAMEWORK OF LEGAL SUPPORT AS A FACTOR OF NATIONAL SAFETY
Publikacja -
COMPARATIVE ANALYSES OF INTERNATIONALIZATION OF KAZAKHSTAN ENTERPRISES
PublikacjaThis paper presents the instruments of internationalization of enterprises operating within the Eurasian Economic Union. Research contains answers of 108 enterprises exporters located in the Republic of Kazakhstan. The purpose of the paper is to show the main forms of the internationalization of enterprises in Kazakhstan. The paper also presents the following instruments of enterprises’ internationalization including: indirect...
-
Activity-based payments: alternative (anonymous) online payment model
PublikacjaElectronic payments are the cornerstone of web-based commerce. A steady decrease in cash usage has been observed, while various digital payment technologies are taking over. They process sensitive personal information raising concerns about its potentially illicit usage. Several payment models that confront this challenge have been proposed. They offer varying levels of anonymity and readiness for adoption. The aim of this study...
-
Enhancing the bioconversion rate and end products of black soldier fly (BSF) treatment – A comprehensive review
PublikacjaFood security remains a pressing concern in the face of an increasing world population and environmental challenges. As climate change, biodiversity loss, and water scarcity continue to impact agricultural productivity, traditional livestock farming faces limitations in meeting the growing global demand for meat and dairy products. In this context, black soldier fly larvae (BSFL) have emerged as a promising alternative for sustainable...
-
On IPSec Performance Testing of IPv4/IPv6 IPSec Gateway
PublikacjaZapewnienie, że brama IPSec (ang. Internet Protocol Security) spełnia oczekiwania wydajnościowe jest jednym z najważniejszych wyzwań, przed jakimi stoi zespół projektowy tworzący ten produkt. Jedynie odpowiednie podejście do walidacji może zagwarantować, że przepustowość ruchu IPSec bramy jest na oczekiwanym poziomie, czas dodawania/usuwania konfiguracji SA (ang. Security Associations) jest akceptowalny, brama IPSec jest w stanie...
-
A place of school in the idea of the sustainable development
PublikacjaWell designed school space enables social contacts, increases activity of pupils and improves the condition of their health. However, the best design would not bring the expected benefits if it is not integrated with the surroundings in terms of transportation, security and local needs. In the sustainable development, the social goals are in harmony with ecological aims according to the rule of "3 r" (reduce, reuse, recycle).
-
Self-Organizing Wireless Monitoring System for Containers
PublikacjaThis paper presents a description of new global monitoring system for containers, with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing Container Monitoring Network...
-
Self-organizing wireless monitoring system for cargo containers
PublikacjaThis paper presents a description of new global monitoring system for containers with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing ContainerMonitoring Network is...
-
Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks
PublikacjaThe increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated...
-
Resolving conflicts in object tracking for automatic detection of events in video
PublikacjaAn algorithm for resolving conflicts in tracking of moving objects is presented. The proposed approach utilizes predicted states calculated by Kalman filters for estimation of trackers position, then it uses color and texture descriptors in order to match moving objects with trackers. Problematic situations, such as splitting objects, are addressed. Test results are presented and discussed. The algorithm may be used in the system...
-
Secure Quaternion Feistel Cipher for DICOM Images
PublikacjaAn improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...
-
IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA
Publikacja34 IMPLEMENTATION OF INOGATE PROGRAMME IN ARMENIA, AZERBAIJAN AND GEORGIA Krystyna Gomółka Department of Social Sciences and Philosophy, Faculty of Management and Economics, Gdansk University of Technology Ul. G. Narutowicza 11/12, 80 - 233 Gdańsk, Poland Krystyna.Gomolka@zie.pg.gda.pl Abstract INOGATE Programme is one of the instruments designed for the implementation of the energy policy developed by the EU and...
-
Distributed measurement system with data transmission secured using XXTEA algorithm
PublikacjaThe paper deals with wireless data transmission security in the distributed measurement and control system. An overview of cryptographic algorithms was presented paying special attention to the algorithm dedicated to units with low processing power, which is important due to minimization of energy consumption. Measurement modules equipped with simple microcontrollers send data wirelessly to the central unit. The transmission was...
-
Sailing Vessel Routing Considering Safety Zone and Penalty Time for Altering Course
PublikacjaIn this paper we introduce new model for simulation sea vessel routing. Besides a vessel types (polar diagram) and weather forecast, travel security and the number of maneuvers are considered. Based on these data both the minimal travelling costs and the minimal processing time are found for different vessels and different routes. To test our model the applications SailingAssistance wad improved. The obtained results shows that...
-
Bezpieczeństwo transmisji danych w systemie KNX
PublikacjaW artykule przedstawiono wymagania dotyczące bezpieczeństwa transmisji danych w rozproszonych systemach automatyki budynków oraz wskazano potrzebę wprowadzenia mechanizmów ochrony informacji w protokole komunikacyjnym standardu KNX. Zaprezentowano trzy różne metody ochrony informacji opracowane dla systemu KNX: EIBsec, KNX Data Security oraz metodę autorską. Porównano ich właściwości oraz przedstawiono potencjalne obszary zastosowań.
-
Bezpieczeństwo transmisji danych w systemie KNX
PublikacjaW artykule przedstawiono wymagania dotyczące bezpieczeństwa transmisji danych w rozproszonych systemach automatyki budynków oraz wskazano potrzebę wprowadzenia mechanizmów ochrony informacji w protokole komunikacyjnym standardu KNX. Zaprezentowano trzy różne metody ochrony informacji opracowane dla systemu KNX: EIBsec, KNX Data Security oraz metodę autorską. Porównano ich właściwości oraz przedstawiono potencjalne obszary zastosowań.
-
Politiceskaja pressa o rosijsko-ukrainskich otnoszenijach i sobytiach w Krymu = Polish press covering russian- ukrainian relations and events in Crimea
PublikacjaThe paper made a review of opinions expressed by the most widely read Polish newpapers on the issue of Ukraine-Russian relations and events in Crimea in the period from early December 2013 till late March 2014. The author has brought to light attitudes to the events in Ukraine perceived while having in mind preserving security of Poland in political, economic and societal aspects. The EC policy towards the Russian Federation and...
-
Quaternion Encryption Method for Image and Video Transmission
PublikacjaQuaternions are hyper-complex numbers of rank 4. They are often applied to mechanics in 3D space and are considered to be one of the best ways of representing rotations. In this paper a quaternion encryption method, based on algorithm by Nagase et al. (2004) has been proposed. According to a computer-based simulation the results of the performed research yield a high level of security, which is additionally strengthened by the...
-
A video monitoring system using ontology-driven identification of threats
PublikacjaIn this paper, we present a video monitoring systemthat leverages image recognition and ontological reasoningabout threats. In the solution, an image processing subsystemuses video recording of a monitored area and recognizesknown concepts in scenes. Then, a reasoning subsystem uses anontological description of security conditions and informationfrom image recognition to check if a violation of a conditionhas occurred. If a threat...
-
A mobile hospital – its advantages and functional limitations
PublikacjaThe idea of a mobile hospital is not entirely new – the need for their use, ranging from military field hospitals to the charity or mass disaster tent cities, shows how much they are needed. While these cases can be reduced to a portable ambulatory unit with a limited scope of outpatient medical activities, a fully functional hospital is a system with a high degree of complexity far exceeding a regime of compact objects. Solutions...
-
Immersive Technologies that Aid Additive Manufacturing Processes in CBRN Defence Industry
PublikacjaTesting unique devices or their counterparts for CBRN (C-chemical, B-biological, R-radiological, N-nuclear) defense relies on additive manufacturing processes. Immersive technologies aid additive manufacturing. Their use not only helps understand the manufacturing processes, but also improves the design and quality of the products. This article aims to propose an approach to testing CBRN reconnaissance hand-held products developed...
-
Meeting Requirements Imposed by Secure Software Development Standards and Still Remaining Agile
PublikacjaThe paper introduces the AgileSafe method of selecting agile practices for software development projects that are constrained by assurance requirements resulting from safety and/or security related standards. Such requirements are represented by argumentation templates which explain how the evidence collected during agile practices implementation will support the conformity with the requirements. Application of the method is demonstrated...
-
Spatial Modelling in Environmental Analysis and Civil Engineering
PublikacjaAs can be seen, Spatial Modelling in Environmental Analysis and Civil Engineering applies to a multitude of applications. In an attempt to bring the topic closer to potential readers, the special issue referred to security methods, optimization of calculations, conducting measurements and empirical tests. Each article has made an original contribution to the development of practical science that can be replicated by researchers...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublikacjaThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Architecture and Basic Assumptions of RSMAD
PublikacjaThe study presents the architecture of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short RSMAD) which is used for transmission (realized using GSM, UMTS or TETRA networks, and through the Internet network), archiving and exploring image data of traffic offenses. The paper also presents selected basic assumptions of the RSMAD system, which are relevant to the implemented by the system...
-
Multichannel Human Body Communication
PublikacjaHuman Body Communication is an attractive alternative for traditional wireless communication (Bluetooth, ZigBee) in case of Body Sensor Networks. Low power, high data rates and data security makes it ideal solution for medical applications. In this paper, signal attenuation for different frequencies, using FR4 electrodes, has been investigated. Performance of single and multichannel transmission with frequency modulation of analog...
-
Improvement of subsoil and railway substructure by explosive means.
PublikacjaQuick and effective method of subsoil and railway substructure improvement by using explosive means (registered trade name: microblasting) allowes design and construct railways on lowered bearing soils (i.e. wetlands, marshlands, industrial by-products, municipal wastes, degraded antropogenic embankments). It is usefull and recommendable technology to construct new railways, modernization or maintenance and repairing of old ones...
-
Incorporating Iris, Fingerprint and Face Biometric for Fraud Prevention in e-Passports Using Fuzzy Vault
PublikacjaA unified frame work which provides a higher security level to e-passports is proposed. This framework integrates face, iris and fingerprint images. It involves three layers of security: the first layer maps a biometric image to another biometric image which is called biostego image. Three mapping schemes are proposed: the first scheme maps single biometric image to single biostego image, the second scheme maps dual biometric images...
-
RUSSIANS ON THE POLISH LABOUR MARKET
PublikacjaThe article looks into the employment of Russian citizens in Poland in 2004– 2018. It presents the legal basis for Russians’ entering Poland and taking up work without having to seek a work permit, and specifies who must apply for such a permit. Russian citizens can obtain refugee status under the Geneva Convention, which grants them the right to move freely, choose their place of residence and undertake paid employment, while...
-
Moving object detection and tracking for the purpose of multimodal surveillance system in urban areas
PublikacjaBackground subtraction method based on mixture of Gaussians was employed to detect all regions in a video frame denoting moving objects. Kalman filters were used for establishing relations between the regions and real moving objects in a scene and for tracking them continuously. The objects were represented by rectangles. The objects coupling with adequate regions including the relation of many-to-many was studied experimentally...