Filtry
wszystkich: 575
-
Katalog
Wyniki wyszukiwania dla: SECURITY SYSTEMS
-
Moving object detection and tracking for the purpose of multimodal surveillance system in urban areas
PublikacjaBackground subtraction method based on mixture of Gaussians was employed to detect all regions in a video frame denoting moving objects. Kalman filters were used for establishing relations between the regions and real moving objects in a scene and for tracking them continuously. The objects were represented by rectangles. The objects coupling with adequate regions including the relation of many-to-many was studied experimentally...
-
Analysis and comparision of safety of children and adult passanger in car based on crash tests results
PublikacjaThis paper presents analysis and comparision of safety of children and adult passanger in car based on crash tests results. The car crash test with four dummies, including two car seats allowed a direct comparison of the security under the same conditions of children and passengers directly to the car seat. Analysis of acceleration and video from the test allows to understand the phenomena during the collision, the air bags influence,...
-
Implementation of the Concept of Flexicurity in the Selected Countries of Central Eastern Europe
PublikacjaThe CEE countries have to create their own flexicurity policies which would take into account the employment policy guidelines, cultural traditions and socio-economic development. The aim of this article is to examine and evaluate the implementation of the flexicurity concept on the basis of the adopted set of composite indicators. The study covers 9 countries of the CEE region, and the research period covers the years 2007 and 2013....
-
Performance Evaluation of the Parallel Codebook Algorithm for Background Subtraction in Video Stream
PublikacjaA background subtraction algorithm based on the codebook approach was implemented on a multi-core processor in a parallel form, using the OpenMP system. The aim of the experiments was to evaluate performance of the multithreaded algorithm in processing video streams recorded from monitoring cameras, depending on a number of computer cores used, method of task scheduling, image resolution and degree of image content variability....
-
Założenia modelu zarządzania kryzysowego bezpieczeństwem w portach morskich
PublikacjaZłożoność przestrzenna i gospodarcza oraz silne oddziaływanie działalności portowej na procesy społeczno-gospodarcze w regionie, wymaga opracowania specjalnego podejścia do zarządzania bezpieczeństwem na obszarach portowych. W pracy przedstawiono założenia modelu zarządzania kryzysowego bezpieczeństwem w portach morskich uwzględniające zasady międzynarodowego kodeksu ISPS (International Ship and Port Security Code) oraz wymagania...
-
Methods of deep modification of low-bearing soil for the foundation of new and spare air runways
PublikacjaAfter analyzing the impact of aircraft on the airport pavement (parking spaces, runways, startways), it was considered advisable to consider the problem of deep improvement or strengthening of its subsoil. This is especially true for low-bearing soil. The paper presents a quick and effective method of strengthening the subsoil intended for the construction of engineering structures used for civil...
-
Wykorzystanie programu AutoFocus do analizy protokołów kryptograficznych
PublikacjaAutoFocus jest narzędziem wspomagającym wytwarzanie systemów wbudowanych charakteryzujących się wysoką niezawodnością. Artykuł prezentuje studium przypadku zastosowania narzędzia i związanej z nim metody formalnej Focus do analizy bezpieczeństwa (ang. security) protokołu tworzenia podpisu cyfrowego w środowisku rozproszonym. Zastosowana metoda formalna wykorzystana została jako ostatni etap zintegrowanej metody oceny protokołów...
-
Radiokomunikacja morska - problemy eksploatacyjne i rozwój
PublikacjaW pracy omówiono stan obecny oraz wynikające z tego problemy eksploatacyjne występujące w radiokomunikacji morskiej, ze szczególnym odniesieniem do zagadnień związanych z bezpieczeństwem pracy na morzu. Scharakteryzowano kierunki rozwoju w obszarach głównych podsystemów składowych tej dziedziny łączności radiowej. Poruszono także coraz bardziej aktualny problem zastosowania systemów łączności dla potrzeb ochrony żeglugi (maritime...
-
RSS-Based DoA Estimation Using ESPAR Antenna for V2X Applications in 802.11p Frequency Band
PublikacjaIn this paper, we have proposed direction-of arrival (DoA) estimation of incoming signals for V2X applications in 802. 11p frequency band, based on recording of received signal strength (RSS) at electronically steerable parasitic array radiator (ESPAR) antenna's output port. The motivation of the work was to prove that ESPAR antenna used to increase connectivity and security in V2X communication can be also used for DoA estimation....
-
Challenges in providing support for management of evidence-based arguments
PublikacjaThe paper considers selected challenges related to the application of evidence based arguments and maps them on the tool support level. In particular, we consider: communication and teamwork, handling large arguments, evidence management and integration, argument assessment and communication, change control and reporting, evidence reuse, user data security and argument portfolio management. Then we explain how these challenges...
-
Modeling the impact of surface currents in a harbor using graph theory
PublikacjaEnsuring security in a harbor requires research into its infrastructure using spatial environmental data. This paper presents a methodology that defines the design of a graph for modeling the interactions between surface currents and moving objects. Combining this graph with port charts that integrate electronic navigation charts with coastal orthophotographs allows us to perform a multidimensional analysis. In addition, the complete...
-
Analysis of human behavioral patterns
PublikacjaWidespread usage of Internet and mobile devices entailed growing requirements concerning security which in turn brought about development of biometric methods. However, a specially designed biometric system may infer more about users than just verifying their identity. Proper analysis of users’ characteristics may also tell much about their skills, preferences, feelings. This chapter presents biometric methods applied in several...
-
EU-Russian Relations and the Eastern Enlargement: Integration or Isolation
Publikacja -
Democratisation and Institutional Development in Romania after 1989
Publikacja -
Transient detection for speech coding applications
PublikacjaSignal quality in speech codecs may be improved by selecting transients from speech signal and encoding them using a suitable method. This paper presents an algorithm for transient detection in speech signal. This algorithm operates in several frequency bands. Transient detection functions are calculated from energy measured in short frames of the signal. The final selection of transient frames is based on results of detection...
-
Multi-Stage Video Analysis Framework
PublikacjaThe chapter is organized as follows. Section 2 presents the general structure of the proposed framework and a method of data exchange between system elements. Section 3 is describing the low-level analysis modules for detection and tracking of moving objects. In Section 4 we present the object classification module. Sections 5 and 6 describe specialized modules for detection and recognition of faces and license plates, respectively....
-
A Novel Multicast Architecture of Programmable Networks
PublikacjaIn the paper a multicast architecture for programmable networks based on separation of group management and network control tasks is proposed. Thanks to this separation, services which want to make use of multicast communications no longer have to implement low-level network functionalities and their operation is greatly simplified. Abstracting service’s view of the network into a fully connected cloud enables us to transparently...
-
Cybersecurity and Privacy in Standards for Smart Grids – a Comprehensive Survey
PublikacjaResilient information and communications technologies are a prerequisite for reliable operation of smart grid. In recent years, many standards for the new form of electricity network have been proposed, which results in operators and other smart grid stakeholders having difficulties in finding the documents which can be related to their particular problems. The purpose of this paper is to bring in all smart grid standards that...
-
Public spaces connecting cities. Green and Blue Infrastructures potential.
PublikacjaA city fragmentation causes a lot of negative effects in urban environment such as: disconnecting the environmental, functional and compositional relations, a loss of urban compactness, chaotic development, visual chaos, a domination of technical landscape, reduction of security. This is why one of main challenges for urban planners is to connect the fragmented structures by creating friendly, attractive and safe public space....
-
Mobility Managment Scenarios for IPv6 Networks-Proxy Mobile IP-v6Implementation Issues
PublikacjaManagement of user at the network layer plays an important role in efficient network operation. In the paper, authors' implementation of one of network-based mobility management models, namely Proxy Mobile IPv6, is presented and tested in a number of networking topologies and communication scenarios. The proposed implementation covers PMPIv6 functionality with optional security extensions (use of Diameter protocol) and handover...
-
Automatic Analysis of Trajectories of Moving Objects
PublikacjaOngoing monitoring is essential to providing security and safety of maritime and air operations. This paper presents the research in the area of automatic analysis of movement of unrestricted vehicles like ships and air-planes. The analysis is aimed at extraction of trajectory information, and the results can be used to identify anomalous behaviour in archived and real-time data. In this paper we focus on data acquired using the...
-
Reinforced Secure Gossiping Against DoS Attacks in Post-Disaster Scenarios
PublikacjaDuring and after a disaster, the perceived quality of communication networks often becomes remarkably degraded with an increased ratio of packet losses due to physical damages of the networking equipment, disturbance to the radio frequency signals, continuous reconfiguration of the routing tables, or sudden spikes of the network traffic, e.g., caused by the increased user activity in a post-disaster period. Several techniques have...
-
Edible black ant Smith (Carebara vidua) as human food – A systematic review
PublikacjaMeeting food security is one of the major global challenges to ensure sufficient supply of food for current and future generations, considering increasing population growth and climate change issues. Consequently, the consumption of edible insects as an alternative food source has recently gained global attention for combating global food insecurity. The present review aims to provide information on the recent progress in consumption...
-
Supporting Cybersecurity Compliance Assessment of Industrial Automation and Control System Components
PublikacjaThe chapter presents a case study demonstrating how security requirements of an Industrial Automation and Control System (IACS) component can be represented in a form of Protection Profile that is based on IEC 62443 standards and how compliance assessment of such component can be supported by explicitly representing a conformity argument in a form based on the OMG SACM meta-model. It is also demonstrated how an advanced argument...
-
A framework for automatic detection of abandoned luggage in airport terminal
PublikacjaA framework for automatic detection of events in a video stream transmitted from a monitoring system is presented. The framework is based on the widely used background subtraction and object tracking algorithms. The authors elaborated an algorithm for detection of left and removed objects based on mor-phological processing and edge detection. The event detection algorithm collects and analyzes data of all the moving objects in...
-
Nuclear power plant as a source of electrical energy and heat
PublikacjaIn this paper certain issues concerning usage of nuclear power plants as sources of not only electric power but also thermal energy will be discussed. For such a solution appeals most of all the need to limit harmful emissions of gases (including CO2) and ashes, which come from the process of burning fossil fuels, as well as the raising demand for network heat and chill. Additionally combined heat and power production brings measurable...
-
Expert assessment of arguments: a method and its experimental evaluation
PublikacjaArgument structures are commonly used to develop and present cases for safety, security and other properties. Such argument structures tend to grow excessively. To deal with this problem, appropriate methods of their assessment are required. Two objectives are of particular interest: (1) systematic and explicit assessment of the compelling power of an argument, and (2) communication of the result of such an assessment to relevant...
-
Bezpieczeństwo w IP Multimedia Subsystem
PublikacjaAbstrakt Artykuł jest trzecim w cyklu prac poświęconych IP Multimedia Subsystem (IMS) - po przedstawieniu architektury i usług IMS, odpowiednio w zeszytach 12/2009 oraz 2-3/2011 Przeglądu Telekomunikacyjnego i Wiadomości Telekomunikacyjnych. W obecnym artykule przedstawiono sposoby zapewnienia bezpieczeństwa przy realizacji tych usług.Artykuł został podzielony został na trzy części w których omówiono ogólne wyzwania bezpieczeństwa...
-
In Situ Verification of Numerical Model of Water Hammer in Slurries
PublikacjaThis paper presents a numerical model of transient flow in a pressure slurry pipeline network with verification based on in situ measurements. The model, primarily verified in laboratory conditions, has been extended and applied to the case of a large and complex slurry pipeline network in Poland. In the model, the equivalent density concept was applied. In situ experiments were performed for various unsteady flow episodes, caused by...
-
Political Parties in the Digital World
PublikacjaThe aim of this report is to outline how digital technologies and digital media are redefining the way political parties fulfill their role as collective platforms for political participation of citizens, e.g. in relation to the parties’ decision-making processes, communication strategies, funding mechanisms, membership, information sharing, etc. and to highlight the existing international standards and good practices in this area....
-
Hedging Strategies of Derivatives Instruments for Commodity Trading Entities
PublikacjaHedging as an outcome of risk management arises to account several questions. Mentioned aspect of size of the hedging is one of them. Latter questioning refers to whether producer of manufacturer are willing to secure entire exposure, when the hedging should start, now or later in the future, what is the vision on market like direction of market, time of interest, magnitude of exposure, what would be the preferred instruments of...
-
Using EO satellite data in Safe City and Coastal Zone web-GIS
PublikacjaThe paper presents a novel design of a web-based Safe City & Coastal Zone GIS (SCCZ-GIS) which integrates data acquired from different remote sensing and geospatial data sources for monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilizes several innovative technologies and directly co-operates with different remote sensing data sources and services, like a satellite ground station...
-
E-Voting System Evaluation Based on the Council of Europe Recommendations: nVotes
PublikacjaE-voting implantation has been facing important challenges in recent years. Several incidents, together with a lack of evaluation methodologies social and cultural customs hinder a broader application. In this work, the authors aim to contribute to a safer introduction of e-voting tools by applying a practical evaluation framework strongly based on the security requirements issued by the Council of Europe (CoE) in 2017 to nvotes,...
-
Coastal zone monitoring using Sentinel-1 SAR polarymetry data
PublikacjaIn recent years the role of the surveillance and security of Polish boundaries has significantly increased. Polish coastal zone monitoring requires various approaches using various technological means in order to ensure the protection of Polish boundaries. In this paper, the authors discuss and present alternatives to underwater surveillance methods of coastal area analysis and monitoring using data retrieved from the newly developed...
-
A model-based approach to analysis of authentication protocols.
PublikacjaW referacie przedstawiono zintegrowane podejście do analizy protokołów uwierzytelniania o nazwie Object-oriented Formal Authentication Protocol Security Analysis Framework (OF-APSAF). Podejście to jest zaprojektowane na bazie sprawdzonej metody formalnej CSP wraz z narzędziami ją wspierającymi: Casper oraz FDR. Jego integralną częścią jest półformalna zorientowana obiektowo technika modelowania protokołów, ich kontekstu oraz wymagań...
-
Integration and Visualization of the Results of Hydrodynamic Models in the Maritime Network-Centric GIS of Gulf of Gdansk
PublikacjaEnsuring of security in the coastal area makes on a seaside countries research in the field of infrastructure spatial information of environmental data. The paper presents the results of work on the construction of this infrastructure by integrating electronic navigational chart with ortophotomaps of coastal areas as well as numerical data from weather and hydrodynamic models. Paper focuses on a problems associated with creating...
-
ADAPTIVE PREDICTIONS OF THE EURO/ZŁOTY CURRENCY EXCHANGE RATE USING STATE SPACE WAVELET NETWORKS AND FORECAST COMBINATIONS
PublikacjaThe paper considers the forecasting of the euro/Polish złoty (EUR/PLN) spot exchange rate by applying state space wavelet network and econometric forecast combination models. Both prediction methods are applied to produce one-trading-day- ahead forecasts of the EUR/PLN exchange rate. The paper presents the general state space wavelet network and forecast combination models as well as their underlying principles. The state space...
-
A fair distribution scheme for joint fingerprinting and decryption methods= Sprawiedliwy schemat dystrybucji dla metod łącznego osadzania odcisku palca oraz deszyfracji
PublikacjaThe paper addresses the fairness of the security provided by digital fingerprinting methods. It was noted that the digital fingerprinting techniques are designed primarily to protect service providers against the actions of malicious users, while honest users remain vulnerable to acts of malicious providers. The paper describes the customer's rights problem and the unbinding problem, which also apply to joint fingerprinting and...
-
Electricity demand prediction by multi-agent system with history-based weighting
PublikacjaEnergy and load demand forecasting in short-horizons, over an interval ranging from one hour to one week, is crucial for on-line scheduling and security functions of power system. Many load forecasting methods have been developed in recent years which are usually complex solutions with many adjustable parameters. Best-matching models and their relevant parameters have to be determined in a search procedure. We propose a hybrid...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublikacjaFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
Resolving conflicts in object tracking for automatic detection of events in video
PublikacjaW referacie przedstawiono algorytm rozwiązywania konfliktów w śledzeniu obiektów ruchomych. Proponowana metoda wykorzystuje predykcję stanu obiektu obliczaną przez filtry Kalmana oraz dopasowuje wykryte obiekty do struktur śledzących ich ruch na podstawie deskryptorów koloru i tekstury. Omówiono specyficzne sytuacje powodujące konflikty, takie jak rozdzielanie obiektów. Przedstawiono wyniki testów. Algorytm może być zastosowany...
-
Towards the value-based design of on-line services
PublikacjaThe paper identifies economic factors shaping customer bahaviour in on-line services in two interrelated dimensions; (1) economic needs and requirements, relevant to expected benefits and values perceived by customers; (2) technical components, allowing technical realization of on-line services. Technical components were cathegorized into four groups, creating so-called VIPR model: Visual, Interactive, Process and Relationship-relevant...
-
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublikacjaAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
Bezpieczeństwo funkcjonalne i ochrona informacji w obiektach i systemach infrastruktury krytycznej – wymagania i kryteria
PublikacjaNiniejsza praca poświęcona jest zagadnieniom zarządzania bezpieczeństwem funkcjonalnym w cyklu życia z uwzględnieniem norm międzynarodowych PN-ENIEC 61508 i PN-ENIEC 61511 oraz zarządzaniu bezpieczeństwem informacji w systemach i sieciach komputerowych w nawiązaniu do wytycznych OECD i wymagań normy PN-ISO/IEC 27001. Rozważa się przykłady skupionych i rozproszonych sieci komputerowych pełniących funkcje monitorowania, sterowania...
-
Comparison of state feedback and PID control of pressurizer water level in nuclear power plant
PublikacjaThe pressurizer water level control system in nuclear power plant with pressurized water reactor (PWR) is responsible for coolant mass balance. The main control goal is to stabilize the water level at a reference value and to suppress the effect of time-varying disturbances (e.g. coolant leakage in primary circuit pipeline system). In the process of PWR power plant operation incorrect water level may disturb pressure control or...
-
Architecture of Request/Response and Publish/Subscribe System Capable of Processing Multimedia Streams
PublikacjaAnaliza ''w locie'' (ang. on-the-fly) strumieni multimedialnych, zawierających wysokiej jakości dane obrazu i dźwięku, wciąż stanowi wyzwanie dla projektantów oprogramowania. Praca przedstawia architekturę systemu zdolnego do przetwarzania w czasie rzeczywistym strumieni multimedialnych przy użyciu komponentów działających w architekturze Publish/Subscribe oraz Request/Response, korzystających z możliwości Java Multimedia Framework...
-
Efficient removal of 2,4,6-trinitrotoluene (TNT) from industrial/military wastewater using anodic oxidation on boron-doped diamond electrodes
PublikacjaWith growing public concern about water quality particular focus should be placed on organic micropollutants, which are harmful to the environment and people. Hence, the objective of this research is to enhance the security and resilience of water resources by developing an efficient system for reclaiming industrial/military wastewater and protecting recipients from the toxic and cancerogenic explosive compound – 2,4,6-trinitrotoluene...
-
Interaction with medical data using QR-codes
PublikacjaBar-codes and QR-codes (Quick Response ) are often used in healthcare. In this paper an application of QR-codes to exchange of laboratory results is presented. The secure data exchange is proposed between a laboratory and a patient and between a patient and Electronic Health Records. Advanced Encryption Standard was used to provide security of data encapsulated within a QR-code. The experimental setup, named labSeq is described....
-
Integrating web site services into application through user interface
PublikacjaThe issue of integrating applications which are only accessible through visual user interface is not thoroughly researched. Integration of web applications running remotely and controlled by separate organizations becomes even more complicated, as their user interface can display differently in different browsers or change without prior notification as a result of application maintenance. While possible, it is generally not common...
-
Multimodal Surveillance Based Personal Protection System
PublikacjaA novel, multimodal approach for automatic detection of abduction of a protected individual, employing dedicated personal protection device and a city monitoring system is proposed and overviewed. The solution is based on combining four modalities (signals coming from: Bluetooth, fixed and PTZ cameras, thermal camera, acoustic sensors). The Bluetooth signal is used continuously to monitor the protected person presence, and in case...