Filtry
wszystkich: 693
-
Katalog
Wyniki wyszukiwania dla: DATA FUSION CRITICAL INFRASTRUCTURE SECURITY
-
Evaluation of Decision Fusion Methods for Multimodal Biometrics in the Banking Application
PublikacjaAn evaluation of decision fusion methods based on Dempster-Shafer Theory (DST) and its modifications is presented in the article, studied over real biometric data from the engineered multimodal banking client verification system. First, the approaches for multimodal biometric data fusion for verification are explained. Then the proposed implementation of comparison scores fusion is presented, including details on the application...
-
Sensors and Sensor’s Fusion in Autonomous Vehicles
PublikacjaAutonomous vehicle navigation has been at the center of several major developments, both in civilian and defense applications. New technologies such as multisensory data fusion, big data processing, and deep learning are changing the quality of areas of applications, improving the sensors and systems used. New ideas such as 3D radar, 3D sonar, LiDAR, and others are based on autonomous vehicle revolutionary development. The Special...
-
Mechanizmy bezpieczeństwa w strefie C systemu netBaltic
PublikacjaW artykule zaprezentowano rozwiązania zaimplementowane do zabezpieczania komunikacji w warunkach sporadycznej i nieciągłej łączności (Delay Tolerant Networking – DTN) w systemie netBaltic - charakterystycznej dla strefy C tego systemu. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych, architektura bezpieczeństwa całego systemu została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI),...
-
Plasma models, contribution matrix for detector setup and generated projections for plasma emissivity reconstruction in fusion devices
Dane BadawczeThe original plasma models for fusion devices, together with the complementary detector setup in the form of a contribution matrix and generated projections. Samples are packed inside a Plasma Tomography Format (PTF) files which is a part of the Plasma Tomography in Fusion Devices Python package, and inside the general JSON format. The constructed dataset...
-
Horizon Europe proposals - Administrative Part
Dane BadawczeThe dataset contains data collected during the HE National Contact Point training on Oct. 12, 2022, reg. the administrative part of Horizon Europe grant proposals. The data set includes presentations concerning administrative forms of 2022 proposals and their content, including participant data; information about abstract writing, keyword choice and...
-
Security Mechanisms in the Comcute System
PublikacjaThe aim of this paper is pointing out the basic security problems and mechanisms in the Comcute system - maintenance system of large computing power in the face of critical crisis. Moreover security mechanism and tools useful to apply in laboratory model as well as target version of the Comcute system are presented.
-
Asynchronous Networked Estimation System for Continuous Time Stochastic Processes
PublikacjaIn this paper we examine an asynchronous networked estimation system for state estimation of continuous time stochastic processes. Such a system is comprised of several estimation nodes connected using a possibly incomplete communication graph. Each of the nodes uses a Kalman filter algorithm and data from a local sensor to compute local state estimates of the process under observation. It also performs data fusion of local estimates...
-
Sensors and System for Vehicle Navigation
PublikacjaIn recent years, vehicle navigation, in particular autonomous navigation, has been at the center of several major developments, both in civilian and defense applications. New technologies, such as multisensory data fusion, big data processing, or deep learning, are changing the quality of areas of applications, improving the sensors and systems used. Recently, the influence of artificial intelligence on sensor data processing and...
-
Architektura bezpieczeństwa systemu netBaltic
PublikacjaW artykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Comparative Analysis of Developed Rainfall Intensity–Duration–Frequency Curves for Erbil with Other Iraqi Urban Areas
PublikacjaRainfall Intensity–Duration–Frequency (IDF) relationships are widely used in water infrastructure design and construction. IDF curves represent the relationship between rainfall intensity, duration, and frequency, and are obtained by analyzing observed data. These relationships are critical for the safe design of flood protection structures, storm sewers, culverts, bridges, etc. In this study, the IDF curves and empirical IDF formulas...
-
Jerzy Konorski dr hab. inż.
OsobyJerzy Konorski otrzymał tytuł mgr inż. telekomunikacji na Poitechnice Gdańskiej, zaś stopień doktora n.t. w dyscyplinie informatyka w Instytucie Podstaw Informatyki PAN. W r. 2007 obronił rozprawę habilitacyjną na Wydziale Elektroniki, Telekomnikacji i Informatyki PG. Jest autorem ponad 150 publikacji naukowych, prowadził projekty naukowo-badawcze finansowane ze środków Komitetu Badań Naukowych, UE, US Air Force Office of Scientific...
-
Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm
PublikacjaWe consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...
-
Paweł Burdziakowski dr inż.
Osobydr inż. Paweł Burdziakowski jest specjalista w zakresie fotogrametrii i teledetekcji lotniczej niskiego pułapu, nawigacji morskiej i lotniczej. Jest również licencjonowanym instruktorem lotniczym oraz programistą. Głównymi obszarami zainteresowania jest fotogrametria cyfrowa, nawigacja platform bezzałogowych oraz systemy bezzałogowe, w tym lotnicze, nawodne, podwodne. Prowadzi badania w zakresie algorytmów i metod poprawiających...
-
Secure access control and information protection mechanisms in radio system for monitoring and acquisition of data from traffic enforcement cameras
PublikacjaThe study presents the architecture of the Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (in short: RSMAD), particularly concerning access control and protection of confidential data. RSMAD security structure will be discussed in relation to network security issues. Additionally, the paper presents the results of the work associated with the modelling of potential threats to system security.
-
Sterowanie predykcyjne i fuzja danych w systemie dynamicznego pozycjonowania statku
PublikacjaRozprawa doktorska poświęcona jest badaniu zastosowania fuzji danych oraz sterowania predykcyjnego w systemie dynamicznego pozycjonowania statku. W pierwszej części pracy przedstawiono historię rozwoju systemów dynamicznego pozycjonowania, różne metody estymacji położenia statku, metody sterowania oraz cel i tezę pracy. Następnie zaprezentowano model matematyczny statku, kinematykę oraz dynamikę. W kolejnej części przedstawiono...
-
Security Assessment of a Turbo-Gas Power Plant
PublikacjaCritical infrastructures are exposed to new threats due to the large number of vulnerabilities and architectural weaknesses introduced by the extensive use of information and communication technologies. This paper presents the results of an exhaustive security assessment for a turbo-gas power plant.
-
Multibeam Echosounder and LiDAR in Process of 360-Degree Numerical Map Production for Restricted Waters with HydroDron
PublikacjaIn order to increase the safety of inland navigation and facilitate the monitoring of the coastal zone of restricted waters, a model of multi-sensory fusion of data from hydroacoustic and optoelectronic systems mounted on the autonomous survey vessel HydroDron will be developed. In the research will be used the LiDAR laser scanner and multibeam echosounder. To increase the visual quality and map accuracy, additionally side scan...
-
The methods of secure data transmission in the KNX system
PublikacjaThe article presents the demands concerning data security in distributed building automation systems and shows the need for providing mechanisms of secure communication in the KNX system. Three different methods developed for KNX data protection are discussed: EIBsec, KNX Data Security and the author's method. Their properties are compared and potential areas of application are presented.
-
Financial Cryptography and Data Security Conference
Konferencje -
Framework for extracting rails and setting-out railway line axis based on UAV photogrammetric measurements
Dane BadawczeTechnical diagnostics enables assessing the current technical condition of a railway line and adjacent infrastructure, and to forecast its changes over a specific time horizon. One of its elements is the periodic monitoring of rail position and their geometry. The data set presents a new framework for the setting-out of a railway track axis. The process...
-
Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej - analiza i ocena
PublikacjaW niniejszym rozdziale monografii przedstawiono bardzo aktualną problematykę związaną z analizą bezpieczeństwa funkcjonalnego rozproszonych systemów sterowania i automatyki zabezpieczeniowej w obiektach infrastruktury krytycznej, wykorzystujących przemysłową sieć komputerową, z uwzględnieniem zagadnień ochrony informacji. W obiektach tego typu systemy sterowania i automatyki zabezpieczeniowej są projektowane jako systemy rozproszone,...
-
Standards on Cyber Security Assessment of Smart Grid
PublikacjaSecurity evaluation of communication systems in smart grid poses a great challenge to the developers and operators. In recent years many new smart grid standards were proposed, which paradoxically results in the difficulty in finding a relevant publication in this plethora of literature. This paper presents the results of a systematic analysis which aimed at addressing this issue by identifying standards that present sound security...
-
Analysis of GNSS, Hydroacoustic and Optoelectronic Data Integration Methods Used in Hydrography
PublikacjaThe integration of geospatial data in hydrography, performed using different measurement systems, involves combining several study results to provide a comprehensive analysis. Each of the hydroacoustic and optoelectronic systems is characterised by a different spatial reference system and the method for technical implementation of the measurement. Therefore, the integration of hydrographic data requires that problems in selected...
-
Mechanizmy bezpieczeństwa transmisji w systemie netBaltic
Publikacjaartykule zaprezentowano założenia dotyczące zabezpieczania węzłów sieci realizowanej w ramach systemu netBaltic. Ze względu na dużą różnorodność rozważanych mechanizmów komunikacyjnych architektura bezpieczeństwa została podzielona na kilka elementów – infrastrukturę klucza publicznego (PKI), bezpieczeństwo systemowe węzłów, zabezpieczanie komunikacji w modelu samoorganizującej wieloskokowej sieci kratowej, a także sieci niewrażliwej...
-
Spatial Visualization Based on Geodata Fusion Using an Autonomous Unmanned Vessel
PublikacjaThe visualization of riverbeds and surface facilities on the banks is crucial for systems that analyze conditions, safety, and changes in this environment. Hence, in this paper, we propose collecting, and processing data from a variety of sensors—sonar, LiDAR, multibeam echosounder (MBES), and camera—to create a visualization for further analysis. For this purpose, we took measurements from sensors installed on an autonomous, unmanned...
-
Asynchronous distributed state estimation for continuous-time stochastic processes
PublikacjaWe consider the problem of state estimation of a continuous-time stochastic process using an asynchronous distributed multi-sensor estimation system (ADES). In an ADES the state of a process of interest is estimated by a group of local estimators. Each local estimator based, for example, on a Kalman filter, performs single sensor filtration but also fusion of its local results and results from other (remote) processors to compute...
-
Software Agents for Computer Network Security
PublikacjaThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
A Set of Experience-Based Smart Synergy Security Mechanism in Internet of Vehicles
PublikacjaIn this article, we introduce a novel security mechanism, the Smart Synergy Security (3S). The mechanism uses the Set of Experience Knowledge Structure (SOEKS) and the synergy of security methods in different domains to provide the global optimal security strategy. The proposed strategy is taking into account the characteristics of information security (i.e. confidentiality, integrity, availability, controllability, and reviewability)...
-
Computer -Aided Local Energy Planning Using ALEP-PL Software
PublikacjaThe issue of energy system planning, including the planning of local energy systems, is critical, since it affects the security of energy supplies in communities, regions, and consequently the security of energy supply within the country. Energy planning is a complex process that requires integration of different goals i.e. improvement of energy efficiency, increase in the share of renewables in the energy balance and CO2} emission...
-
Wireless Link Selection Methods for Maritime Communication Access Networks—A Deep Learning Approach
PublikacjaIn recent years, we have been witnessing a growing interest in the subject of communication at sea. One of the promising solutions to enable widespread access to data transmission capabilities in coastal waters is the possibility of employing an on-shore wireless access infrastructure. However, such an infrastructure is a heterogeneous one, managed by many independent operators and utilizing a number of different communication...
-
Security Information Sharing for the Polish Power System
PublikacjaThe Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...
-
Hybrid System for a Person Tracking in Harsh Indoor Environments
PublikacjaIn the article, the prototype of a system for a person tracking in a harsh indoor environment, especially when no other commercially available radiolocalization system can be used, was briefly described. The prototype realizes the data fusion, i.e. combines data from inertial and environmental sensors and radio distance measurements to estimate the position of a moving person. It is worth noting that the concept and practical realization...
-
EXAMINING INFLUENCE OF VIDEO FRAMERATE AND AUDIO/VIDEO SYNCHRONIZATION ON AUDIO-VISUAL SPEECH RECOGNITION ACCURACY
PublikacjaThe problem of video framerate and audio/video synchronization in audio-visual speech recognition is considered. The visual features are added to the acoustic parameters in order to improve the accuracy of speech recognition in noisy conditions. The Mel-Frequency Cepstral Coefficients are used on the acoustic side whereas Active Appearance Model features are extracted from the image. The feature fusion approach is employed. The...
-
EXAMINING INFLUENCE OF VIDEO FRAMERATE AND AUDIO/VIDEO SYNCHRONIZATION ON AUDIO-VISUAL SPEECH RECOGNITION ACCURACY
PublikacjaThe problem of video framerate and audio/video synchronization in audio-visual speech recogni-tion is considered. The visual features are added to the acoustic parameters in order to improve the accuracy of speech recognition in noisy conditions. The Mel-Frequency Cepstral Coefficients are used on the acoustic side whereas Active Appearance Model features are extracted from the image. The feature fusion approach is employed. The...
-
A wireless network for off-shore marine research
PublikacjaThis paper presents functionality, the most important technology developments and potential use cases of digital communication system, developed to facilitate selected tasks commonly required during off-shore operations and marine research, including: broadband information sharing between platforms isolated from an on-shore communication infrastructure, acquisition of large data-sets from variety of off-shore...
-
ASSESSMENT OF FINANCIAL SECURITY OF AN ENTERPRISE ON THE BASIS OF BEHAVIORAL ECONOMICS
PublikacjaThe article substantiates that the level of company’s financial security depends not so much on the indicators of its activity, but on its perception of decision-makers and other stakeholders. At the same time, this perception is formed due to the continuous participation of the stakeholder in operations, constant monitoring of financial indicators, the study of current approaches to enterprise management, changes in the environment,...
-
Systemy bezprzewodowej łączności i transmisji danych dla potrzeb bezpieczeństwa publicznego (studium stanu i rozwiązań)
PublikacjaW niniejszym rozdziale przedstawiono charakterystyki rozwiązań użytkowych zrealizowanych w Katedrze Systemów i Sieci Radiokomunikacyjnych Politechniki Gdańskiej. Autorzy scharakteryzowali opracowane przez zespół badawczy Katedry, systemy bezprzewodowego monitoringu zagrożeń bezpieczeństwa oraz zarządzania i sterowania infrastrukturami krytycznymi. W tym też kontekście omówiono następujące systemy i aplikacje użytkowe: − globalny...
-
International Conference on Internet of Things, Big Data and Security
Konferencje -
Hossein Nejatbakhsh Esfahani PhD
OsobyMy research interests lie primarily in the area of Learning-based Safety-Critical Control Systems, for which I leverage the following concepts and tools:-Robust/Optimal Control-Reinforcement Learning-Model Predictive Control-Data-Driven Control-Control Barrier Function-Risk-Averse Controland with applications to:-Aerial and Marine robotics (fixed-wing UAVs, autonomous ships and underwater vehicles)-Multi-Robot and Networked Control...
-
Identifying Selected Tram Transport Risks
PublikacjaIn the area of transport infrastructure risks, infrastructure is inspected for safety. It is an element of transport safety management based on risk management and forms part of preventative activities and measures. As regards tram infrastructure which is a component of urban transport infrastructure, there are potential collisions with cars, cyclists and pedestrians. Data from Gdansk Buses and Trams...
-
Some Security Features of Selected IoT Platforms
PublikacjaIoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...
-
Anomaly Detection in Railway Sensor Data Environments: State-of-the-Art Methods and Empirical Performance Evaluation
PublikacjaTo date, significant progress has been made in the field of railway anomaly detection using technologies such as real-time data analytics, the Internet of Things, and machine learning. As technology continues to evolve, the ability to detect and respond to anomalies in railway systems is once again in the spotlight. However, railway anomaly detection faces challenges related to the vast infrastructure, dynamic conditions, aging...
-
Data Analysis in Bridge of Data
PublikacjaThe chapter presents the data analysis aspects of the Bridge of Data project. The software framework used, Jupyter, and its configuration are presented. The solution’s architecture, including the TRYTON supercomputer as the underlying infrastructure, is described. The use case templates provided by the Stat-reducer application are presented, including data analysis related to spatial points’ cloud-, audio- and wind-related research.
-
Evaluation of the Possibility of Identifying a Complex Polygonal Tram Track Layout Using Multiple Satellite Measurements
PublikacjaWe present the main assumptions about the algorithmization of the analysis of measurement data recorded in mobile satellite measurements. The research team from the Gda´nsk University of Technology and the Maritime University in Gdynia, as part of a research project conducted in cooperation with PKP PLK (Polish Railway Infrastructure Manager), developed algorithms supporting the identification and assessment of track axis layout....
-
Evaluation of the Possibility of Identifying a Complex Polygonal Tram Track Layout Using Multiple Satellite Measurements
PublikacjaWe present the main assumptions about the algorithmization of the analysis of measurement data recorded in mobile satellite measurements. The research team from the Gda´nsk University of Technology and the Maritime University in Gdynia, as part of a research project conducted in cooperation with PKP PLK (Polish Railway Infrastructure Manager), developed algorithms supporting the identification and assessment of track axis layout....
-
The effect of environmental turbulence on cyber security risk management and organizational resilience
PublikacjaEven though there is a plethora of research on the role of environmental turbulence in organizational performance in general, little attention has been paid to the effect of environmental turbulence on cyber security risk management and further - organizational resilience. Drawing on the resource-based view and contingency theory, this study investigates how technological and market turbulence influence organizational cyber security...
-
Stanowisko wizualizacji zdarzeń w systemie STRADAR – realizacja i funkcje dla operatora
PublikacjaIt is crucial for the Border Guard to be equipped with a communication-teleinformatic infrastructure designed to support them in efficient realization of their operational tasks. STRADAR – a system which results are presented in this paper – is such an infrastructure. It is a distributed solution for the maritime division of the border guard. The system, with the use of a network of sensors located in both stationary and mobile...
-
Quality Expectations of Mobile Subscribers
PublikacjaMobile systems, by nature, have finite resources. Radio spectrum is limited, expensive and shared between many users and services. Mobile broadband networks must support multiple applications of voice, video and data on a single IP-based infrastructure. These converged services each have unique traffic holding and quality requirements. A positive user experience must be obtained through efficient partitioning of the available wireless...
-
The concept of anti-collision system of autonomous surface vehicle
PublikacjaThe use of unmanned vehicles in various fields of science and the economy is becoming more common. An extremely important aspect of creating this type of solution is to provide autonomous vehicle navigation, which does not require interference of the human factor or in which it is limited to a minimum. This article discusses the concept of autonomous anti-collision system of unmanned surface vehicle. It proposed a sensor system...
-
Validation of a virtual test environment for C2X communication under radio jamming conditions
PublikacjaIn this paper, we propose a novel car-2-x communication security testing methodology in the physical layer of wireless systems. The approach is dedicated to automated testing of autonomous vehicles and it is essential for such complex systems operation, especially with regard to safety and security issues. It is based on scenario-driven testing in virtual and real test environments created from collected or simulated data. The...