Filtry
wszystkich: 7
Wyniki wyszukiwania dla: TERRORIST ATTACK
-
GNSS and LNSS Positioning of Unmanned Transport Systems: The Brief Classification of Terrorist Attacks on USVs and UUVs
Publikacja -
Architectural and Urban Planning Solutions for the Protection of Heritage Buildings in the Context of Terrorist Attacks: Following the Example of Passive Protection Systems
PublikacjaEvents in recent years showing numerous terrorist attacks raise awareness regarding the neces-sity of considering the safety of heritage buildings. The analysis of available data allows us to conclude that it is not possible to fully prevent terrorist attacks. On the other hand, it is possible to minimize the impact of such incidents through proper design of Passive Protection System (PPS) components. One possible architectural...
-
Diver Observations by Means of Acoustic Methods
PublikacjaSearching for objects, especially small ones, moving under water near its the free surface, is always not an easy task. Designing tools for the detection of such targets is a real challenge when the possibility of a terrorist attack is a real threat. This paper presents some aspects of diver detection by means of acoustics methods, both active (side scan sonar) and passive ones (linear receiving antenna). This approach is quite...
-
Coastal Cliffs Monitoring and Prediction of Displacements Using Terrestial Laser Scanning
PublikacjaCoastal cliffs are very sensitive to degradation caused by erosion and abrasion. Thus, it is very important to monitor susceptibility of the cliffs in terms of slope angles and ground fall resulting from vertical morphology of the cliffs. The results could be used for example to establish the boundaries of the safe investments zone or retreat infrastructure buildings in case of real threat such as degradation of the objects of...
-
Device for spoofing in global positioning system
PublikacjaThis article describes the device which may be used to generate false GPS signals and emit them into radio communication channel. Such attack is called GPS spoofing. Each GPS receiver which remains in the range of a spoofing device (called spoofer) indicates time and position coordinates which are predetermined by the spoofer’s operator. Spoofing may be used e.g. in order to disable the terrorist group from obtaining correct navigation...
-
Quality Model for Integrated Security Monitoring and Control in Water Distribution Systems
PublikacjaThis article addresses the problem of drinking water distribution system (DWDS) security in the terms of water quality which in the era of terrorist threat is of high importance to the public. The contribution of this paper is the development of the so called security module to extend a multi-species water quality model. This gives an insight to the situation in DWDS not only under normal operational conditions but also in case...
-
Modelling of laminated glass PVB walls of buildings exposed to vehicle impact with different speeds
PublikacjaThis paper presents an analytical model, developed for laminated glass subjected to a low-velocity impact. It has the ability to capture glass cracks as well as large non-linear deformations. It is based mathematically on the firstorder deformation concept, which considers the effect of membrane and transverse shear as well as bending. This theory uses damage mechanics to capture the glass cracking. For this purpose, several experiments...