Filtry
wszystkich: 2839
wybranych: 1653
-
Katalog
- Publikacje 1653 wyników po odfiltrowaniu
- Czasopisma 464 wyników po odfiltrowaniu
- Konferencje 80 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 66 wyników po odfiltrowaniu
- Projekty 10 wyników po odfiltrowaniu
- Kursy Online 431 wyników po odfiltrowaniu
- Dane Badawcze 134 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: SECURITY OF SEAPORTS
-
Electricity demand prediction by multi-agent system with history-based weighting
PublikacjaEnergy and load demand forecasting in short-horizons, over an interval ranging from one hour to one week, is crucial for on-line scheduling and security functions of power system. Many load forecasting methods have been developed in recent years which are usually complex solutions with many adjustable parameters. Best-matching models and their relevant parameters have to be determined in a search procedure. We propose a hybrid...
-
Deep Learning: A Case Study for Image Recognition Using Transfer Learning
PublikacjaDeep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...
-
Deep Learning
PublikacjaDeep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...
-
I, Robot: between angel and evil
PublikacjaThe boosting of most digital innovations within recent technology progress by artificial intelligence (AI) constitutes a growing topic of interest. Besides its technical aspects, increasing research activity may be observed in the domain of security challenges, and therefore of responsibility related to the controlled or hypothetically uncontrolled or autonomous emergence of AI solutions. Consequently, responsibility and ethics...
-
A model-based approach to analysis of authentication protocols.
PublikacjaW referacie przedstawiono zintegrowane podejście do analizy protokołów uwierzytelniania o nazwie Object-oriented Formal Authentication Protocol Security Analysis Framework (OF-APSAF). Podejście to jest zaprojektowane na bazie sprawdzonej metody formalnej CSP wraz z narzędziami ją wspierającymi: Casper oraz FDR. Jego integralną częścią jest półformalna zorientowana obiektowo technika modelowania protokołów, ich kontekstu oraz wymagań...
-
The KLC Cultures Synergy for Organizational Agility. Trust, Risk-Taking Attitude, and Critical Thinking as Moderators
PublikacjaOrganizational agility is visible in organizational change adaptability, and it is based on the development of dynamic capabilities, strategic sensitivity of leaders, accuracy and timing of decision-making, learning aptitude, flexibility in thinking and acting, and smooth resource flow across organizations, including the knowledge resource. In such a context, this study aimed to expose how the knowledge, learning, and collaboration...
-
Determination of free tyrosine in equestrian supplements by LC–MS/MS and comparison of its quantity with total free amino acids content in view of doping control
PublikacjaThe reports on the probable beneficial impact of tyrosine (TYR) supplementation on performance enhancement have contributed to the growth of interest in TYR in equestrian sports field and related industries, such as the manufacture of dietary and nutritional supplements. In this study, the first attempt to the assessment of horses exposure to TYR during nutritional supplementation was demonstrated by quantification of unbound TYR...
-
Testing for conformance of parallel programming pattern languages
PublikacjaThis paper reports on the project being run by TUG and IMAG, aimed at reducing the volume of tests required to exercise parallel programming language compilers and libraries. The idea is to use the ISO STEP standard scheme for conformance testing of software products. A detailed example illustrating the ongoing work is presented.
-
Techniczne aspekty implementacji nowoczesnej platformy e-learningowej
PublikacjaZaprezentowano aspekty techniczne implementacji nowoczesnej platformy nauczania zdalnego. Omówiono obszary funkcjonalne takie jak: system zarządzania nauczaniem, serwis informacyjny, dodatkowe oprogramowanie dydaktyczne oraz kolekcja zasobów multimedialnych. Przybliżono zagadnienia związane z bezpieczeństwem takiej platformy. Na końcu przedstawiono parametry techniczne wdrożonej na Politechnice Gdańskiej platformy eNauczanie.
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublikacjaThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
A comprehensive overview of software product management challenges
PublikacjaThe principal focus of software product management is to ensure the economic success of the product, which means to prolong the product life as much as possible with modest expenditures to maximizs profits. Software product managers play an important role in the software development organization while being responsible for the strategy, business case, product roadmap, high-level requirements, product deployment (release-management),...
-
Ontology-based text convolution neural network (TextCNN) for prediction of construction accidents
PublikacjaThe construction industry suffers from workplace accidents, including injuries and fatalities, which represent a significant economic and social burden for employers, workers, and society as a whole.The existing research on construction accidents heavily relies on expert evaluations,which often suffer from issues such as low efficiency, insufficient intelligence, and subjectivity.However, expert opinions provided in construction...
-
Detection of Closing Crack in Beam Based on Responses Induced by Harmonic Excitation
PublikacjaThe non-linear contact model was chosen to simulate the closed crack in the cantilever beam. The study examines the shape and characteristics of the phase diagram of a cantilever beam with closed cracks. It investigates how various crack properties influence the geometry of the phase diagram and proposes a method for identifying cracks based on their features. The area of each closed curve in the phase diagram is determined using...
-
Sacral sound-engineering
PublikacjaOrganologic and campanologic acoustical problems due to applications to sacral objects are characterized on ground of numerous reviewed publications and engineering reports. Participations of several involved research centres, mostly Polish, at solving these problems are evaluated. Some desirable future developments are indicated. Appendices bring examples of documentation on selected investigated objects.
-
The Dynamics of Trade Relations between Ukraine and Romania: Modelling and Forecasting
PublikacjaThe article examines the monthly dynamics of exports, imports and balance of trade between Ukraine and Romania in the period from 2005 to 2021. Time series from 2015 to 2021 were used for modelling and forecasting (since the date the European Union–Ukraine Association Agreement took effect). Adequate models of the dynamics series of the Box-Jenkins methodology were built: additive models with seasonal component ARIMA (Autoregressive...
-
Decisional DNA (DDNA) Based Machine Monitoring and Total Productive Maintenance in Industry 4.0 Framework
PublikacjaThe entire manufacturing spectrum is transforming with the advent of Industry 4.0. The features of Set of Experience Knowledge Structure (SOEKS) and Decisional DNA (DDNA) were utilized for developing Virtual Engineering Objects (VEO), Virtual Engineering Process (VEP) and Virtual Engineering Factory (VEF), which in turn facilitate the creation of smart factories. In this study, DDNA based Machine Monitoring for Total Maintenance...
-
OCHRONA PRYWATNOŚCI W SYSTEMACH MONITORINGU WIZYJNEGO, PRZEGLĄD OPRACOWANYCH ARCHITEKTUR I ALGORYTMÓW
PublikacjaNieustannie rozwijające się technologie informacyjne związane z inteligentnym monitoringiem wizyjnym stwarzają ryzyko niewłaściwego wykorzystywania danych osobowych. W celu zapewnienia prawidłowej ochrony materiału wizyjnego, w ramach projektów realizowanych w Katedrze Systemów Multimedialnych WETI PG, opracowany został szereg architektur i algorytmów, które ułatwiają ochronę danych wrażliwych, takich jak: wizerunki osób, numery...
-
Verification of the Parameterization Methods in the Context of Automatic Recognition of Sounds Related to Danger
PublikacjaW artykule opisano aplikację, która automatycznie wykrywa zdarzenia dźwiękowe takie jak: rozbita szyba, wystrzał, wybuch i krzyk. Opisany system składa się z bloku parametryzacji i klasyfikatora. W artykule dokonano porównania parametrów dedykowanych dla tego zastosowania oraz standardowych deskryptorów MPEG-7. Porównano też dwa klasyfikatory: Jeden oparty o Percetron (sieci neuronowe) i drugi oparty o Maszynę wektorów wspierających....
-
WERYFIKACJA KONCEPCJI PRZEGUBÓW PLASTYCZNYCH PROJEKTOWANYCH NA ODZIAŁYWANIA SEJSMICZNE WIADUKTU V6 OBWODNICY ISTAMBUŁU
PublikacjaW pracy zawarto wyniki analiz betonowego wiaduktu V6 budowanego w ciągu obwodnicy Istambułu w Turcji realizowanego w ramach projektu Northern Marmara Highway. Przeprawę stanowią dwie niezależne nitki o skrzynkowym przekroju poprzecznym i szerokości 22,00 m. Schemat statyczny obiektu to belka dziewięcioprzęsłowa o długości całkowitej 446,86 m oparta na podporach słupowych o zmiennej sztywności (rys.1) i wysokościach zmieniających...
-
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublikacjaAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
Towards the value-based design of on-line services
PublikacjaThe paper identifies economic factors shaping customer bahaviour in on-line services in two interrelated dimensions; (1) economic needs and requirements, relevant to expected benefits and values perceived by customers; (2) technical components, allowing technical realization of on-line services. Technical components were cathegorized into four groups, creating so-called VIPR model: Visual, Interactive, Process and Relationship-relevant...
-
Resolving conflicts in object tracking for automatic detection of events in video
PublikacjaW referacie przedstawiono algorytm rozwiązywania konfliktów w śledzeniu obiektów ruchomych. Proponowana metoda wykorzystuje predykcję stanu obiektu obliczaną przez filtry Kalmana oraz dopasowuje wykryte obiekty do struktur śledzących ich ruch na podstawie deskryptorów koloru i tekstury. Omówiono specyficzne sytuacje powodujące konflikty, takie jak rozdzielanie obiektów. Przedstawiono wyniki testów. Algorytm może być zastosowany...
-
Hazardous material-related propagation of the effects of train accidents in the subgrade
PublikacjaA large part of the transport of hazardous materials is carried out by rail. Therefore, the security of these transports is becoming increasingly important. Every catastrophe involving dangerous materials has a negative impact on the participants of the incident and the surrounding environment, because its range is generally not local. It follows that in the event of a catastrophe, its effects should be minimized and remediation...
-
Realistic noise-tolerant randomness amplification using finite number of devices
PublikacjaRandomness is a fundamental concept, with implications from security of modern data systems, to fundamental laws of nature and even the philosophy of science. Randomness is called certified if it describes events that cannot be pre-determined by an external adversary. It is known that weak certified randomness can be amplified to nearly ideal randomness using quantum-mechanical systems. However, so far, it was unclear whether randomness amplification...
-
On the fast BSS transition algorithms in the IEEE 802.11r local area wireless networks
PublikacjaHandover performance is critical to support multimedia services that are becoming increasingly available over the wireless devices. The high transition delay can be unaccepted for such services or can be a source of disruption on the session. On the other side, IEEE 802.11 standard is being extended with new functionalities. Security and QoS features, included in recent IEEE 802.11-2007 standard, add management frames that are...
-
Concept of Multifactor Method and Non-Functional Requirements Solution to Increase Resilience through Functional Safety with Cybersecurity Analysis
PublikacjaIn the process of designing safety systems, an integrated approach in safety and cybersecurity analysis is necessary. The paper describes a new technique of increasing resilience through integrated analysis of functional safety and cybersecurity. It is a modeling methodology based on the combination of the multifactor method utilizing modified risk graphs, used previously for Safety Integrity Level (SIL) assessment, and the Non-Functional...
-
Trustworthy Applications of ML Algorithms in Medicine - Discussion and Preliminary Results for a Problem of Small Vessels Disease Diagnosis.
PublikacjaML algorithms are very effective tools for medical data analyzing, especially at image recognition. Although they cannot be considered as a stand-alone diagnostic tool, because it is a black-box, it can certainly be a medical support that minimize negative effect of human-factors. In high-risk domains, not only the correct diagnosis is important, but also the reasoning behind it. Therefore, it is important to focus on trustworthiness...
-
A Review of Traffic Analysis Attacks and Countermeasures in Mobile Agents' Networks
PublikacjaFor traditional, message-based communication, traffic analysis has been already studied for over three decades and during that time various attacks have been recognised. As far as mobile agents’ networks are concerned only a few, specific-scope studies have been conducted. This leaves a gap that needs to be addressed as nowadays, in the era of Big Data, the Internet of Things, Smart Infrastructures and growing concerns for privacy,...
-
Towards large-scale application of nanoporous materials in membranes for separation of energy-relevant gas mixtures
PublikacjaMembranes containing nanoporous materials (such as zeolites, metal–organic materials and 2D materials such as graphene derivatives) may allow more efficient separation of gas mixtures relevant to emerging energy technologies. For example, such membranes could be applied in the separation of gases containing mixtures of carbon dioxide (CO2) and hydrogen (H2). However, these membranes are currently at a relatively low technology...
-
Diagnostics and monitoring of the longest span extradosed bridge in Europe
PublikacjaThe article presents complex diagnostic procedures applied for the purpose of behavior analysis of the extradosed bridge with the longest span in Europe that was built in 2018 in Poland. The system of health monitoring was used to: register internal forces in temporary supports, monitor concrete bonding, perform in situ diagnostics and operation tests. The bridge is a continuous four-span structure with spans theoretical lengths...
-
An Analysis of Sustainability Reporting Practices of the Global Airline Industry
PublikacjaSustainability reporting (SR) has become a standard practice for many organisations worldwide. The purpose of this paper is to explore and develop our understanding of the global airline industry’s SR practices. Content analysis was employed to map which reporting frameworks the global commercial airline industry has recently used to report their non-financial impacts. Additionally, comparisons were made in the application of SR...
-
China’s international trade and global value chains under One-Belt One-Road initiative
PublikacjaResearch background: After China acceded to the WTO in 2001, its foreign trade has expanded rapidly to be the largest share in the world. However, China's economic development changing from high-speed growth to medium high-speed growth in recent years. At the same time, the increase in labour cost and overcapacity also hinder China’s international trade. In order to solve these challenges and strengthening ties...
-
PRZYKŁAD MODELU GRY FABULARNEJ WSPIERAJĄCY PROCES ZAANGAŻOWANIA I MOTYWACJI STUDENTÓW WYŻSZYCH UCZELNI TECHNICZNYCH
PublikacjaArtykuł prezentuje koncepcję budowy uniwersalnego scenariusza gry fabularnej, która pomaga zbudować zaangażowanie wśród studentów uczelni technicznych. Jednym ze sposobów na wzmożenie motywacji w procesie uczenia się jest gamifikacja. Gdy gamifikacja wspiera proces nauczania często tworzone są modele tematycznie związane z problematyką danego przedmiotu. Scenariusz proponowanej gry jest uniwersalny i można go wykorzystać w ramach...
-
Computer application for railway track realignment
PublikacjaThe topic of this article is the issue of railway track realignment. For this purpose, a computer software application was created that supports computations and generates a report needed for regulation of the trajectory of the railway. This program gives the ability to import data from measurement of the railway trajectory and then perform the calculation of the mathematical realignment. The result of this calculation is the basis...
-
Mechanizmy komunikacji w rozproszonych systemach specjalnego przeznaczenia
PublikacjaZadania ochrony i bezpieczeństwa granic państwa realizowane przez Straż Graniczną wymagają wsparcia ze strony nowoczesnych systemów Technologii Informacyjnych (TI) uwarunkowanych ich specjalnym przeznaczeniem. Z uwagi na charakter tej służby, rozwiązania dla jej potrzeb muszą być realizowane jako systemy rozproszone umożliwiające przenoszenie i przetwarzanie informacji głosowych oraz różnorodnych danych, w tym specjalnego przeznaczenia....
-
Automatyczna weryfikacja klienta bankowego w oparciu o multimodalne technologie biometryczne
PublikacjaW referacie przedstawiono przegląd rozwiązań wykorzystywanych w bankach do weryfikacji tożsamości klientów. Ponadto zawarto opis metod biometrycznych aktualnie wykorzystywanych w placówkach bankowych wraz z odniesieniem do skuteczności i wygody korzystania z dostępnych rozwiązań. Zaproponowano rozszerzenie zakresu wykorzystania technologii biometrycznych, wskazując kierunek rozwoju systemów bezpieczeństwa dla poprawy dostępu do...
-
Diagnosis of Damage in a Steel Tank Model by Shaking Table Harmonic Tests
PublikacjaDiagnosis of damage in civil engineering structures has recently become an important issue in the safety assessment procedure. Among a number of different approaches, a method of measuring the changes in natural frequencies is one of the most effective indicators of global damage. It has been successfully applied to relatively small. structures, however, the tests on large structures are very difficult and the practical application...
-
A multi‐industry and cross‐country comparison of technology contribution to formal and informal knowledge sharing processes for innovativeness
PublikacjaThe study explores the impact of organizational information technology (IT) competency on knowledge sharing, both explicit and tacit, in the context of innovativeness of products and processes. Knowledge sharing is then assessed in terms of tacit-to-explicit conversion and the impact of both types of knowledge on organizational innovation. Both process (internal) and product/service (external) innovation are included. As an extension,...
-
TOPOLOGICAL CLUES FOR PREDICTING OUTCOMES OF MULTIPLAYER ONLINE BATTLE ARENA GAMES
PublikacjaWith 27 million people playing League of Legends every day, e-sports became more and more important part of our everyday life. Rise of its popularity builds a demand for better understanding e-sports mechanics on a deeper level. In the article, we test a hypothesis that it is possible to predict an outcome of Multiplayer Online Battle Arena game based on topological clues only (such as area of polygon where vertices are players...
-
ON ESTIMATION OF OCCUPANT SAFETY IN VEHICULAR CRASHES INTO ROADSIDE OBSTACLES USING NON-LINEAR DYNAMIC ANALYSIS
PublikacjaThe article describes a comparison of two general methods of occupants safety estimation based on a numerical examples. The so-called direct method is mainly based on the Head Injury Criterion of a crash test dummy in a vehicle with passive safety system while the indirect method uses a European standards approach to estimate impact severity level. Numerical simulations in LS-DYNA have been conducted.
-
On extending open source IMS platform for integrated IPTV and VoIP services over IPv6
PublikacjaEven when IMS is the most popular platform for multimedia services, the open versions of IMS ecosystem are lacking in specified functionalities for IPTVv6 and VoIPv6 services. In this paper, we extend current client and server open source software in order to provide reliability and security to these multimedia services. As a part of our work the IMS architecture for conferencing system with proposed mechanisms to improve system...
-
Flexicurity. Elastyczność i bezpieczeństwo
PublikacjaFlexicurity to koncepcja łącząca elastyczność (flexibility) oraz bezpieczeństwo (security) na rynku pracy. Dokumenty strategiczne Unii Europejskiej wskazują, że docelowo funkcjonowanie europejskich rynków pracy będzie bazowało na modelu flexicurity. Koncepcja flexicurity łączy w sobie, dwa pozornie sprzeczne, pojęcia elastyczności i bezpieczeństwa. Opracowanie stanowi przegląd dokumentów Unii Europejskiej oraz publikacji naukowych...
-
Implementation of integrated control In drinking water distribution systems - IT system proposal
PublikacjaImplementation of integrated control algorithms requires suitable hardware and software platforms. Proposed solution must allow realizing control and monitoring tasks, while ensuring high reliability and security of processed data. Additionally, the software and hardware solutions must be immune to outside influence. This paper presents an approach to implementation of control systems in drinking water distribution system. Presented...
-
Architecture of Request/Response and Publish/Subscribe System Capable of Processing Multimedia Streams
PublikacjaAnaliza ''w locie'' (ang. on-the-fly) strumieni multimedialnych, zawierających wysokiej jakości dane obrazu i dźwięku, wciąż stanowi wyzwanie dla projektantów oprogramowania. Praca przedstawia architekturę systemu zdolnego do przetwarzania w czasie rzeczywistym strumieni multimedialnych przy użyciu komponentów działających w architekturze Publish/Subscribe oraz Request/Response, korzystających z możliwości Java Multimedia Framework...
-
Algorithms of chemicals detection using raman spectra
PublikacjaRaman spectrometers are devices which enable fast and non-contact identification of examined chemicals. These devices utilize the Raman phenomenon to identify unknown and often illicit chemicals (e.g. drugs, explosives)without the necessity of their preparation. Now, Raman devices can be portable and therefore can be more widely used to improve security at public places. Unfortunately, Raman spectra measurements is a challenge...
-
A Triplet-Learnt Coarse-to-Fine Reranking for Vehicle Re-identification
PublikacjaVehicle re-identification refers to the task of matching the same query vehicle across non-overlapping cameras and diverse viewpoints. Research interest on the field emerged with intelligent transportation systems and the necessity for public security maintenance. Compared to person, vehicle re-identification is more intricate, facing the challenges of lower intra-class and higher inter-class similarities. Motivated by deep...
-
Threshold Attendance under Soft-Crash Model: TAG Protocol and Markovian Analysis
PublikacjaA realistic and systematic network evaluation should subsume an availability model and a failure model. We combine a "hard availability" model we call threshold attendance, whereby a certain minimum number of network elements must be present at any time, with a soft-crash failure model, whereby after experiencing a failure, a network element is still able to function correctly for a while in an emergency mode at a risk of a major...
-
Assembling and testing of quasi-static hybrid piezoelectric motor based on electroactive lubrication principle
PublikacjaThe presented paper concerns a novel concept of hybrid piezoelectric motor based on electroactive lubrication principle. Its structure is combined of quasi-static and resonance piezoelectric actuators, synchronizing their work to generate the rotary movement. The hybrid motor topology is compared to the existing piezoelectric motors, regarding its field of applications in embedded systems with very high security requirements. The...
-
Analysis of hydrodynamic pressure fields of motorboats and pontoons in shallow water
PublikacjaThe article presents the results of calculations of the pressure fields generated by a motorboat at the bottom of a shallow sea. Calculations were made using the boundary elements method (BEM), arranged on the surface of the boat and the bottom of the sea. This method is described in [3], and applied on a free surface linearized boundary condition. Results for four different lengths of motorboats, from 2.85 m to 9.5 m, sea depth...
-
Interaction with medical data using QR-codes
PublikacjaBar-codes and QR-codes (Quick Response ) are often used in healthcare. In this paper an application of QR-codes to exchange of laboratory results is presented. The secure data exchange is proposed between a laboratory and a patient and between a patient and Electronic Health Records. Advanced Encryption Standard was used to provide security of data encapsulated within a QR-code. The experimental setup, named labSeq is described....