Wyniki wyszukiwania dla: ATTACUS ATLAS - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: ATTACUS ATLAS

Filtry

wszystkich: 439
wybranych: 221

wyczyść wszystkie filtry


Filtry wybranego katalogu

  • Kategoria

  • Rok

  • Opcje

wyczyść Filtry wybranego katalogu niedostępne

Wyniki wyszukiwania dla: ATTACUS ATLAS

  • SafeCity – a GIS-based tool profiled for supporting decision making in urban development and infrastructure protection

    This paper presents a system for analysis of municipal Critical Infrastructures, which offers integrated tools for target analysis, hazard scenario simulations and spatial analysis within a remotely accessible Web-based Geographic Information System. The system has been applied to research conducted in the city of Gdansk with the aid of blast attack, chemical leakage and flood hazard scenarios, as well as a spatial density algorithm,...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Security and Anonymity in Agent Systems

    Publikacja

    - Rok 2012

    Many agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics

    The contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...

    Pełny tekst do pobrania w portalu

  • Amplifying the Randomness of Weak Sources Correlated With Devices

    Publikacja

    - IEEE TRANSACTIONS ON INFORMATION THEORY - Rok 2017

    The problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Photocatalytic performance of alkali metal doped graphitic carbon nitrides and Pd-alkali metal doped graphitic carbon nitride composites

    Publikacja
    • M. Fronczak
    • E. Tálas
    • Z. Pászti
    • G. Szijjártó
    • J. Mihály
    • A. Tompos
    • P. Baranowski
    • S. Tiwari
    • M. Bystrzejewski

    - DIAMOND AND RELATED MATERIALS - Rok 2022

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Modelowanie i ograniczanie skutków ataków uzurpacji uprawnień w systemach teleinformatycznych wspierających różnicowanie poziomu QoS

    W wieloagentowych systemach teleinformatycznych pracujących w paradygmacie Klient-Serwer i wspierających różnicowanie poziomu QoS poważnym zagrożeniem są ataki uzurpacji uprawnień metodą Fałszywego VIPa. Ich celem jest zapewnienie Klientowi nienależnie wysokiego poziomu QoS, co powoduje nadużycie zasobów Serwera i szkody dla innych Klientów. W referacie podjęto próbę sforma-lizowania modelu takich ataków oraz zaproponowa-no obustronnie...

    Pełny tekst do pobrania w portalu

  • Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment

    Publikacja

    The smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures

    Publikacja

    - Rok 2013

    In the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • On design and analysis of flow characteristics of the last stage of gas-steam turbine

    Publikacja

    - Rok 2020

    Research regarding blade design and analysis of flow have been conducted for over a century. Meanwhile new concepts and design approaches were created and improved. Advancements in information technologies allowed to introduce computational fluid dynamics (CFD) and computational flow mechanics (CFM). Currently a combination of mentioned methods is used for design of turbine blades. These methods enabled us to improve flow efficiency...

    Pełny tekst do pobrania w portalu

  • Power equalization of AES FPGA implementation

    This paper briefly introduces side channel attacks on cryptographic hardware with special emphasis on differential power analysis(DPA). Based on existing countermeasures against DPA, design method combining power equalization for synchronous and combinatorialcircuits has been proposed. AES algorithm has been implemented in Xilinx Spartan II-E field programmable gate array (FPGA) deviceusing the standard and power-equalized methods....

    Pełny tekst do pobrania w portalu

  • Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia

    This paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). The solution proposed here is a new joint fingerprinting and decryption method which meets the requirements for both imperceptibility and robustness of fingerprints and scalability in terms of design and distribution of fingerprinted multimedia content. The proposed method uses a simple block cipher based on matrix...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management

    Publikacja

    This article outlines an integrated functional safety and cybersecurity evaluation approach within a framework for business continuity management (BCM) in energy companies, including those using Industry 4.0 business and technical solutions. In such companies, information and communication technology (ICT), and industrial automation and control system (IACS) play important roles. Using advanced technologies in modern manufacturing...

    Pełny tekst do pobrania w portalu

  • Toxoplasma gondii recombinant antigens as tools for serodiagnosis of human toxoplasmosis: current status of studies

    Toxoplasma gondii is a parasitic protozoan which is the cause of toxoplasmosis. Although human toxoplasmosis in healthy adults is usually asymptomatic, serious disease can occur in the case of congenital infections and immunocompromised individuals. Furthermore, despite the exact recognition of its etiology, it still presents a diagnostic problem. Diagnosis of toxoplasmosis is mainly based on the results of serological tests detecting...

    Pełny tekst do pobrania w portalu

  • Benchmarking the Digital Government Value Chain

    Publikacja

    Digital Government (DG) benchmarking is an academically vivid topic and, equally important, a tool with the potential to provide valuable insights to policymakers and public managers responsible for digital policies at the level of countries and international bodies. Alas, this potential remains largely untapped in the current DG benchmarking practice. In our study, we identify the reasons and propose a way of mitigating them....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • How to fund an additional secular function in the monumental church?

    Publikacja

    - Rok 2018

    The implementation of a new public function into the non-used church spaces like attics or cellars in context of revitalizing a lawfully protected historical city areas have diversified aspects. The article describes the financial aspect of adaptation of omitted spaces of monumental sacral buildings by presenting funding possibilities in the European Union countries available in period of 2017-2018 and the funds planned for the...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Selective jamming of OFDM transmission in NB-IoT radio interface

    Publikacja

    - Rok 2023

    The paper presents the concept of smart jamming, which involves selective interference aimed at critical components of the OFDM signal. Research verifying the feasibility of this type of electronic attack are described. A realized testbed for jamming real NB-IoT signals in a downlink is presented. The test results demonstrate the feasibility of realizing selective jamming and its greater effectiveness compared to barrage interference.

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Pealizacija inicjatiw wostocznogo partnerstwa w Azerbajdżane

    Azerbaijan established political relations with the EU during the implementation of TACIS Programme projects and signed the Partnership and Cooperation Agreement with the EU in 1996. It joined the European Neighbourhood Policy in 2004 and the Eastern Partnership programme in 2009. Despite the sceptical attitude taken by Azerbaijan's government towards the Eastern Partnership initiative, the EU earmarked further funds for Azerbaijan for 2011 – 2014 as part of the European Neighbourhood and Partnership Instrument. During the third Eastern Partnership summit in Vilnius in November 2013, Azerbaijan signed only an agreement concerning visa facilitations and readmission. However, it also undertook certain measures as part of the five Eastern Partnership initiatives. In the framework of the Integrated Border Management Programme, Azerbaijan implemented projects connected with improving the access of resettled people to the judicial system, creation of electronic border control systems, social protection, increasing public awareness to eliminate domestic violence, improving assimilation of asylum - seekers and immigrants, and supporting occupational health organisations. Activities aimed at supporting SMEs included training for entrepreneurs, promotional conferences and loans to the SME sector. Recommendations of the initiative promoting the creation of regional electrical and renewable energy markets were implemented by Azerbaijan in the form of 33 projects as part of the INOGATE Programme. With respect to environmental management, Azerbaijan developed a digital regional atlas of natural disasters, and with respect to natural disaster mitigation it planned population protection measures. Azerbaijan was ranked last but one in the evaluation presented in the annual report prepared by the EU. The transformation process in this country has been slow and illusory in certain aspects. Nevertheless, the EU has continued its Eastern Partnership initiative activities, allocating between EUR 252,000 and 308,000 for transformations in Azerbaijan

    Pełny tekst do pobrania w portalu

  • Educational and cognitive aspects of adaptation of nonuse spaces in monumental sacral objects.

    Publikacja

    - Rok 2018

    The area of attics and towers in historic churches in Europe are yet quite inaccessible places for visitors, shrouded in the atmosphere of mysticism, hiding many secrets. Introduction of the new public function into the non-used zones of the monumental sacral objects has many aspects including educational and cognitive ones which are discussed in the following article. The article indicates items that can be found in the zone above...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Improving the Survivability of Carrier Networks to Large-Scale Disasters

    Publikacja
    • A. de Sousa
    • J. Rak
    • F. Barbosa
    • D. Santos
    • D. Mehta

    - Rok 2020

    This chapter is dedicated to the description of methods aiming to improve the survivability of carrier networks to large-scale disasters. First, a disaster classification and associated risk analysis is described, and the disaster-aware submarine fibre-optic cable deployment is addressed aiming to minimize the expected costs in case of natural disasters. Then, the chapter addresses the improvement of the network connectivity resilience...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Service-based Resilience for Embedded IoT Networks

    Publikacja

    - Rok 2020

    Embedded IoT networks are the backbone of safety-critical systems like smart factories, autonomous vehicles, and airplanes. Therefore, resilience against failures and attacks should be a prior concern already in their design stage. In this study, we introduce a service-based network model as an MILP optimization problem for the efficient deployment of a service overlay to the embedded network by meeting QoS and resilience requirements....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Distributed protection against non-cooperative node behavior in multi-hop wireless networks

    Publikacja

    An important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...

  • Security Information Sharing for the Polish Power System

    Publikacja

    - Rok 2015

    The Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...

  • Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm

    Publikacja

    - Rok 2014

    We consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • RECODIS: Resilient Communication Services Protecting End-user Applications from Disaster-based Failures

    Publikacja
    • J. Rak
    • D. Hutchison
    • E. Calle
    • T. Gomes
    • M. Gunkel
    • P. Smith
    • J. Tapolcai
    • S. Verbrugge
    • L. Wosinska

    - Rok 2016

    Disaster-based failures can seriously disrupt any communication network, making its services unavailable. Such disruptions may be caused by natural disasters, technology-related failures, or malicious attacks, and they are observably increasing in number, intensity and scale. When network services that are a part of critical infrastructure become unavailable, commercial and/or societal problems are inevitable. The issue of limiting...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining

    This paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Dynamical description of quantum computing: generic nonlocality of quantumnoise

    Publikacja

    We develop a dynamical non-Markovian description of quantum computing in the weak-coupling limit, in the lowest-order approximation. We show that the long-range memory of the quantum reservoir (such as the 1/t4 one exhibited by electromagnetic vacuum) produces a strong interrelation between the structure of noise and the quantum algorithm, implying nonlocal attacks of noise. This shows that the implicit assumption of quantum error...

    Pełny tekst do pobrania w portalu

  • Possible uses of crisis situation aiding system in virtual world simulation

    Publikacja

    - Rok 2012

    Many of the real world crisis situations like spreading fire, hostile units attack, flood, and etc. are commonly used in computer games where a simulation of extensive virtual world is crucial. This paper presents some ideas for possible uses of existing crisis situation aiding system in such environments. Moreover it shows how this kind of system can be taught during subsequent games with a large number of players.

  • PTR-MS and electronic nose application for volatile fraction analysis of cigar tobacco

    Publikacja

    Cigar consumers attach great importance to the quality of these products. At the same time, cigars are often expensive, so destructive analytical methods of quality control are not being desired. However, it has been found that there are many volatile organic compounds in their headspace. Because of that, proton transfer reaction–mass spectrometry and electronic nose were used to analyse it. The obtained results were used to distinguish...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Radio Simulcasting at a Glance: a New Look at Broadcasting and Streaming Services

    Publikacja

    - Rok 2018

    Radio is by far one of the most popular and accessible medium. With its availability it attracts listeners all around the world. There are numerous ways of delivering content to consumers. The present situation is characterized by the convergence of acoustics, computer science and telecommunications. This paper reviews the current status of radio broadcasting and streaming services. It describes a subjective study concerning different...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Several notes on technical modernization of a historical building

    Publikacja

    - Rok 2013

    This paper describes methods and means used during the renovation process of several elements of a building – the assembly hall, inner courtyards and attics of the main building at Gdansk University of Technology, both in design and construction domains. A tissue of a historic building required special approach to these tasks, with special emphasis on good recognition of problems, careful planning and consistent implementing of...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Threat intelligence platform for the energy sector

    In recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...

    Pełny tekst do pobrania w portalu

  • Disaster-resilient communication networks: Principles and best practices

    Publikacja
    • A. Mauthe
    • D. Hutchison
    • E. Cetinkaya
    • I. Ganchev
    • J. Rak
    • J. P. Sterbenz
    • M. Gunkelk
    • P. Smith
    • T. Gomes

    - Rok 2016

    Communication network failures that are caused by disasters, such as hurricanes, arthquakes and cyber-attacks, can have significant economic and societal impact. To address this problem, the research community has been investigating approaches to network resilience for several years. However, aside from well-established techniques, many of these solutions have not found their way into operational...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Some Security Features of Selected IoT Platforms

    Publikacja

    - TASK Quarterly - Rok 2020

    IoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...

    Pełny tekst do pobrania w portalu

  • Ring Opening of Triflates Derived from Benzophospholan-3-one Oxides by Aryl Grignard Reagents as a Route to 2‑Ethynylphenyl(diaryl)phosphine Oxides

    Publikacja

    A new simple method for the synthesis of 2-ethynylphenyl(diaryl)phosphine oxides via ring opening of benzophosphol-3-yl triflates has been developed. This process occurs via nucleophilic attack of a Grignard reagent at the phosphorus center, which results in ring opening and cleavage of a leaving group. The reaction proceeds under mild conditions and, within 15−60 min, leads to a library of previously unavailable 2-ethynylphenylphosphine...

    Pełny tekst do pobrania w portalu

  • Determination of causes of accelerated local corrosion of austenitic steels in water supply systems

    This paper concerns an inspection of a water supply system, made of AISI 304 steel, which showed signs of local corrosion at the weld. Such corrosion caused material perforation after very short periods of operation. It was revealed that steel was sensitised during the welding process. It was also proven that chromium micro-segregation occurred in the alloy leading to galvanic cell formation which initialised the process of pitting...

    Pełny tekst do pobrania w portalu

  • Service-based Resilience via Shared Protection in Mission-critical Embedded Networks

    Publikacja

    Mission-critical networks, which for example can be found in autonomous cars and avionics, are complex systems with a multitude of interconnected embedded nodes and various service demands. Their resilience against failures and attacks is a crucial property and has to be already considered in their design phase. In this paper, we introduce a novel approach for optimal joint service allocation and routing, leveraging virtualized...

    Pełny tekst do pobrania w portalu

  • Possible uses of crisis situation aiding system in virtual world simulation

    Many of the real world crisis situations like spreading fire, hostile units attack, flood, and etc. are commonly used in computer games where a simulation of extensive virtual world is crucial. This paper presents some ideas for possible uses of existing crisis situation aiding system in such environments. Moreover, it shows how this kind of system can be taught during subsequent games with a large number of players. As an example...

  • Mesh dependence study for numerical assessment of hydrodynamic characteristics of windsurfing fin

    Publikacja

    - Rok 2021

    The presented research aims to assess the drag coefficient and lift coefficient versus angle of attack curves for windsurfing fin. Special attention in the research was being paid to the evaluation of the stall angle value. The angle of incidence for which the stall occurs was searched, and the sensitivity of the solution for the mesh resolution was studied. The mesh resolution sensitivity analysis was done by systematically decreasing...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The Novel Findings About the Hussite’s Warfares in the Gdansk/Danzig Surrounding in the Late Summer of 1433

    Publikacja

    - Rok 2023

    One of the most spectacular episodes during the Hussite Wars was the Czech raid through the lands of the Teutonic Order up to the Baltic Sea in 1433. Although historians and then-witnesses focused on the sacked Cistercian Abbey in Oliva and soldiers filling the bottles with seawater, the scale of damages in the main harbour of Prussia and its surroundings has not been the subject of research yet. Furthermore, most scholars treatthe...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Selektywne zakłócanie transmisji OFDM w interfejsie radiowym NB-IoT

    W artykule przedstawiono zagadnienie tzw. inteligentnego zagłuszania, polegającego na selektywnym zakłócaniu krytycznych składowych sygnału OFDM. Opisane zostały badania weryfikujące możliwość przeprowadzenia tego rodzaju ataku elektronicznego. Przedstawiono zrealizowane stanowisko badawcze, umożliwiające zakłócanie rzeczywistych sygnałów NB-IoT w łączu w dół. Wyniki badań wykazują możliwość realizacji selektywnego zagłuszania...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Cops, a fast robber and defensive domination on interval graphs

    Publikacja

    - THEORETICAL COMPUTER SCIENCE - Rok 2019

    The game of Cops and ∞-fast Robber is played by two players, one controlling c cops, the other one robber. The players alternate in turns: all the cops move at once to distance at most one each, the robber moves along any cop-free path. Cops win by sharing a vertex with the robber, the robber by avoiding capture indefinitely. The game was proposed with bounded robber speed by Fomin et al. in “Pursuing a fast robber on a graph”,...

    Pełny tekst do pobrania w portalu

  • Quality Modeling in Grid and Volunteer-Computing Systems

    Publikacja

    - Rok 2013

    A model of computational quality in large-scale computing systems was presented in the previous chapter of this book. This model describes three quality attributes: performance, reliability and energy efficiency. We assumed that all processes in the system are incessantly ready to perform calculations and that communication between the processes occurs immediately. These assumptions are not true for grid and volunteer computing...

  • Zarządzanie zaufaniem w bezprzewodowych sieciach czujników - studium przypadku

    W artykule przedstawiono studium przypadku dotyczące zastosowania bezprzewodowej sieci czujników do wspomagania pacjenta z nadwagą w jego środowisku domowym. Przyjęto, że sieć wykorzystuje metodę rozproszonego zarządzania zaufaniem i pokazano, że metoda ta umożliwia wykrycie i izolację czujników realizujących działania sprzeczne z polityką sieci. Ilościowe oszacowanie czasu niezbędnego do wykrycia takich...

  • Ochrona odbiorników GNSS przed zakłóceniami celowymi

    Artykuł dotyczy zastosowania algorytmów przestrzennego cyfrowego przetwarzania sygnałów dla potrzeb selektywnej eliminacji sygnałów zakłócających pracę odbiorników nawigacji satelitarnej GNSS. Omówiono podatność tych odbiorników na ataki elektroniczne typu zagłuszanie oraz spoofing. Polegają one na celowej emisji sygnałów niepożądanych w paśmie pracy systemu. Następnie przedstawiono koncepcję przeciwdziałania tego rodzaju zakłóceniom...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Influence of windsurfing fin stiffness distribution on the lift-drag characteristics

    Publikacja

    This article addresses the problem of determining the hydromechanical loads generated by flexible hydrofoils. The research was done on the example of the composite windsurfing fin for the RS:X monotype class. Despite the assumption of fins identity, everyday practice showed that variations of mechanical properties occur and strongly affect their performance. Therefore, we decided to study the differences between the windsurfing...

    Pełny tekst do pobrania w portalu

  • Diver Observations by Means of Acoustic Methods

    Publikacja

    Searching for objects, especially small ones, moving under water near its the free surface, is always not an easy task. Designing tools for the detection of such targets is a real challenge when the possibility of a terrorist attack is a real threat. This paper presents some aspects of diver detection by means of acoustics methods, both active (side scan sonar) and passive ones (linear receiving antenna). This approach is quite...

    Pełny tekst do pobrania w portalu

  • Coastal Cliffs Monitoring and Prediction of Displacements Using Terrestial Laser Scanning

    Publikacja

    Coastal cliffs are very sensitive to degradation caused by erosion and abrasion. Thus, it is very important to monitor susceptibility of the cliffs in terms of slope angles and ground fall resulting from vertical morphology of the cliffs. The results could be used for example to establish the boundaries of the safe investments zone or retreat infrastructure buildings in case of real threat such as degradation of the objects of...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Analysis of impact of audio modifications on the robustness of watermark for non-blind architecture

    The aim of this paper is to assess the robustness of the non-blind audio content watermarking scheme proposed by the authors. The authors present the architecture of the designed system along with the employed workflows for embedding and extracting the watermark followed by the implementation phase description and the analysis of the experimental results. Some possible attack simulations on the embedded watermarks are reviewed,...

    Pełny tekst do pobrania w portalu

  • Statistically efficient smoothing algorithm for time-varying frequency estimation

    The problem of extraction/elimination of a nonstationary sinusoidal signal from noisy measurements is considered. This problem is usually solved using adaptive notch filtering (ANF) algorithms. It is shown that the accuracy of frequency estimates can be significantly increased if the results obtained from ANF are backward-time filtered by an appropriately designed lowpass filter. The resulting adaptive notch smoothing (ANS) algorithm...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Device for spoofing in global positioning system

    This article describes the device which may be used to generate false GPS signals and emit them into radio communication channel. Such attack is called GPS spoofing. Each GPS receiver which remains in the range of a spoofing device (called spoofer) indicates time and position coordinates which are predetermined by the spoofer’s operator. Spoofing may be used e.g. in order to disable the terrorist group from obtaining correct navigation...

    Pełny tekst do pobrania w portalu