Filtry
wszystkich: 439
wybranych: 221
Wyniki wyszukiwania dla: ATTACUS ATLAS
-
Parki tematyczne w rozwoju lokalnym miasteczek i wsi
PublikacjaObecnie niemal każde polskie miasto i wieś ma na celu znalezienie dobrego pomysłu na swój rozwój społeczno-gospodarczy. Najczęściej jest nim założenie parku tematycznego. Dobrze się dzieje, gdy takie przedsięwzięcie wspiera lokalne tradycje, zwyczaje i walory kulturowe miasta czy wsi; gdy promowane są miejscowe produkty i żywność. Niestety, nie zawsze tak jest. Niektóre miasta i gminy chętniej przyjmują zupełnie inną politykę...
-
Investigation of Continuous Wave Jamming in an IEEE 802.15.4 Network
PublikacjaThis paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate...
-
Damage Detection Strategies in Structural Health Monitoring of Overhead Power Transmission System
PublikacjaOverhead power transmission lines, their supporting towers, insulators and other elements create a highly distributed system that is vulnerable to damage. Typical damage scenarios cover cracking of foundation, breakage of insulators, loosening of rivets, as well as cracking and breakage of lines. Such scenarios may result from various factors: groundings, lightning strikes, floods, earthquakes, aeolian vibrations, conductors galloping,...
-
Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments
Publikacja[Context] The goal of security is to protect digital assets, devices, and services from being disrupted, exploited or stolen by unauthorized users. It is also about having reliable information available at the right time. [Motivation] Since the inception in 2009 of the first cryptocurrency, few studies have been undertaken to analyze and review the state-of-the-art research and current developments with respect to the security...
-
Electron attachment to hexafluoropropylene oxide (HFPO)
PublikacjaWe probe the electron attachment in hexafluoropropylene oxide (HFPO), C3F6O, a gas widely used in plasma technologies. We determine the absolute electron attachment cross section using two completely different experimental approaches: (i) a crossed-beam experiment at single collision conditions (local pressures of 5 × 10−4 mbar) and (ii) a pulsed Townsend experiment at pressures of 20–100 mbar. In the latter method, the cross sections...
-
Applicability of null-steering for spoofing mitigation in civilian GPS
PublikacjaCivilian GPS signals are currently used in many critical applications, such as precise timing for power grids and telecommunication networks. Spoofing may cause their improper functioning. It is a threat which emerges with the growing availability of GPS constellation simulators and other devices which may be used to perform such attack. Development of the effective countermeasures, covering detection and mitigation, is necessary...
-
From the multiple frequency tracker to the multiple frequency smoother
PublikacjaThe problem of extraction/elimination of nonstationary sinusoidalsignals from noisy measurements is considered. This problem is usually solved using adaptive notch filtering (ANF)algorithms. It is shown that the accuracy of frequency estimates can be significantly increased if the results obtained from ANF are backward-time filtered by an appropriately designed lowpass filter. The resulting adaptive notch smoothing (ANS)algorithm...
-
Accuracy of Differential Phase Delay Estimation for GPS Spoofing Detection
PublikacjaGPS spoofing is an attack based on transmission of false signals to target receivers, in order to force the computation of incorrect time, position or velocity information. It is a threat which is recently considered with continuously growing awareness. There is a need for effective way of GPS spoofing detection. Many groups of methods are proposed in the literature. Spatial processing methods are considered to be robust in a wide...
-
High temperature corrosion of evaporator tubes with thermal sprayed coatings
PublikacjaDegradation examinations of outer surface of low-emission steam boiler evaporator tubes are presented in the paper. Metallographic evaluation of scale morphology, its micro sites chemical composition analysis and distribution of elements on cross sections have been performed. Water-wall tubes were exposed in steam boiler for up to two years period. Common tubes made of 16Mo3 steel suffered sulphide and molten salts corrosions....
-
Approach to security assessment of critical infrastructures' information systems
PublikacjaThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Integrated monitoring, control and security of Critical Infrastructure Systems
PublikacjaModern societies have reached a point where everyday life relies heavily on desired operation of critical infrastructures, in spite of accidental failures and/or deliberate attacks. The issue of desired performance operation of CIS at high security level receives considerable attention worldwide. The pioneering generic methodologies and methods are presented in the paper project for designing systems capable of achieving these...
-
Enzymatic activities behind degradation of glucosinolates
PublikacjaMyrosinase (thioglucosidase, EC 3.2.1.147) is the enzyme responsible for the hydrolysis of glucosinolates (GLs). In plant tissue, myrosinase and GLs are sequestered in separate cellular compartments. As a result of cell disruption, e.g., after pathogen attack or on chopping or grinding during food preparation, the myrosinase comes into contact with GLs and catalyzes the hydrolysis of thioglucosidic bond in GL structure. Consequently,...
-
Practical issues for the implementation of survivability and recovery techniques in optical networks
PublikacjaFailures in optical networks are inevitable. They may occur during work being done for the maintenance of other infrastructures, or on a larger scale as the result of an attack or large-scale disaster. As a result, service availability, an important aspect of Quality of Service (QoS), is often degraded. Appropriate fault recovery techniques are thus crucial to meet the requirements set by the Service Level Agreements (SLAs) between...
-
A Multi-Antenna Scheme for Early Detection and Mitigation of Intermediate GNSS Spoofing
PublikacjaThis article presents a method for detecting and mitigating intermediate GNSS spoofing. In this type of attack, at its early stage, a spoofer transmits counterfeit signals which have slight time offsets compared to true signals arriving from satellites. The anti-spoofing method proposed in this article fuses antenna array processing techniques with a multipath detection algorithm. The latter is necessary to separate highly correlated...
-
Personal Brand Authenticity and Social Media: The Top 5 Football Players’ Case
Publikacjahe authenticity is a key factor which attracts the interest of young consumers in the more and more dominant virtual world full of “fake news”,“fake images”, and “fake impressions”. The celebrity authenticity is also important when it comes to gain the positive attitude of the audience and the success in the long term. The unique talent is crucial for all stars. According to football stars, the authenticity of their personal brands...
-
Waste tire rubber as low-cost and environmentally-friendly modifier in thermoset polymers – a review
PublikacjaNowadays, waste tire rubber (WTR) management is a growing and serious problem. Therefore, research works focused on the development of cost-effective and environmentally-friendly methods of WTR recycling are fully justified. Incorporation of WTR into polymer matrices and composite materials attracts much attention, because this approach allows sustainable development of industrially applicable waste tires recycling technologies....
-
Propagowanie lub pochwalanie zachowań o charakterze pedofilskim. The Promotion or Commendation of Paedophilic Behaviour.
Publikacja"Niniejszy artykuł dotyczy przestępstwa publicznego propagowania lub pochwalania zachowań o charakterze pedofilskim. W ramach tekstu analizowane są kolejne elementy struktury tego występku, tj. przedmiot, strona przedmiotowa, podmiot oraz strona podmiotowa. Sama idea wprowadzenia przepisu do kodeksu karnego świadczy o szczególnym znaczeniu, jakie ustawodawca przykłada do ochrony małoletnich przed nadużyciami seksualnymi. Zwieńczenie...
-
Revitalization of Sopot - The Seaside Spa Town in Poland
PublikacjaSopot is a Polish seaside resort. In the past - as early as at the beginning of the 20th century - this town was famous for the healing opportunities they created: good conditions for resting and recreation. This town was places where everyone with enough selfesteem was willing to be seen. Since the post-war reconstruction until 1989 (establishment of local governments in Poland), not much has happened in Polish cities in terms...
-
Multisine impedimetric monitoring with an in-depth distribution of relaxation times analysis of WE43 and AZ31 magnesium alloys corrosion
PublikacjaThis research aims to develop and utilize an impedance-based tool for monitoring non-stationary electrochemical processes, coupling the multisinusoidal perturbation signal approach and distribution of relaxation times (DRT) analysis for the first time. The approach was used to distinguish independent processes occurring at the surface of AZ31 and WE43 Mg alloys undergoing corrosion in Hank’s Balanced Salt Solution at 37 °C. We...
-
Graph security testing
PublikacjaSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
Optimal shape design of multi-element trawl-doors using local surrogate models
PublikacjaTrawl-doors have a large influence on the fuel consumption of fishing vessels. Design and optimiza-tion of trawl-doors using computational models are a key factor in minimizing the fuel consump-tion. This paper presents an optimization algorithm for the shape design of trawl-door shapes using computational fluid dynamic (CFD) models. Accurate CFD models are computationally expensive. Therefore, the direct use of traditional optimization...
-
Drewno w adoptowanym zabytku - studium przypadku. Budynek nr 2 w dawnych koszarach garnizonu we Wrzeszczu
PublikacjaThe current structure along with adapted listed buildings and surroundings will create "Garrison of Culture".This part of Gdańsk and Wrzeszcz has been reconnected after eight decades of isolation from the city by joining the square area formed by Grunwaldzka, Słowackiego, Chrzanowskiego, Szymanowskiego streets and the city center. It is a project whitch fits into an aspect of revitalisation related to the socio-economic and environmental...
-
On Symmetry of Uniform and Preferential Attachment Graphs
PublikacjaMotivated by the problem of graph structure compression under realistic source models, we study the symmetry behavior of preferential and uniform attachment graphs. These are two dynamic models of network growth in which new nodes attach to a constant number m of existing ones according to some attachment scheme. We prove symmetry results for m=1 and 2 , and we conjecture that for m≥3 , both models yield asymmetry with high...
-
Quality Model for Integrated Security Monitoring and Control in Water Distribution Systems
PublikacjaThis article addresses the problem of drinking water distribution system (DWDS) security in the terms of water quality which in the era of terrorist threat is of high importance to the public. The contribution of this paper is the development of the so called security module to extend a multi-species water quality model. This gives an insight to the situation in DWDS not only under normal operational conditions but also in case...
-
Hydroperoxyl radical and formic acid formation from common DNA stabilizers upon low energy electron attachment
Publikacja2-Amino-2-(hydroxymethyl)-1,3-propanediol (TRIS) and ethylenediaminetetraacetic acid (EDTA) are key components of biological buffers and are frequently used as DNA stabilizers in irradiation studies. Such surface or liquid phase studies are done with the aim to understand the fundamental mechanisms of DNA radiation damage and to improve cancer radiotherapy. When ionizing radiation is used, abundant secondary electrons are formed...
-
Classification of Covid-19 using Differential Evolution Chaotic Whale Optimization based Convolutional Neural Network
PublikacjaCOVID-19, also known as the Coronavirus disease-2019, is an transferrable disease that spreads rapidly, affecting countless individuals and leading to fatalities in this worldwide pandemic. The precise and swift detection of COVID-19 plays a crucial role in managing the pandemic's dissemination. Additionally, it is necessary to recognize COVID-19 quickly and accurately by investigating chest x-ray images. This paper proposed a...
-
Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks
PublikacjaThe increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated...
-
The effect of pre-hydrogen charging on corrosion behaviour of superduplex stainless steel welded joints
PublikacjaThe paper presents results of research undertaken to determine the influence of hydrogen on passivity and corrosion resistance of 2507 super duplex stainless steel welded joints. Butt welded joints were made with low heat input using flux corded arc welding (FCAW) method. Coupons of 5.0 x 5.0 mm were cut from the welded joints containing weld metal (WM), heat affected zone (HAZ) and parent metal (PM). Hydrogen was introduced...
-
EE-ISAC—Practical Cybersecurity Solution for the Energy Sector
PublikacjaA recent survey of cybersecurity assessment methods proposed by the scientific community revealed that their practical adoption constitutes a great challenge. Further research that aimed at identifying the reasons for that situation demonstrated that several factors influence the applicability, including the documentation level of detail, the availability of supporting tools, and the continuity of support. This paper presents the...
-
Inbound marketing a skuteczna komunikacja marketingowa
PublikacjaCelem artykułu jest ukazanie koncepcji inbound marketing jako przykładu nowego podejścia do planowania i realizacji polityki komunikacji marketingowej w Internecie. Współcześnie klienci nie chcą być atakowani nachalną reklamą lub zanudzani przez nieatrakcyjne treści. Odwracają się od marek, które prowadzą z nimi komunikację jedynie przy użyciu tradycyjnych działań komunikacji marketingowej. Znane organizacje wykorzystują do promowania...
-
A New Critical Risk on the Block: Cyber Risks as an Example of Technical Knowledge Risks in Organizations
PublikacjaThe breakout of the COVID-19 pandemic has intensified the appearance of many additional technical knowledge risks in organizations. Cyber risks in particular are becoming a great challenge for organizations. At the same time, academic research on cyber risks, their costs, consequences and ability of overcoming them is still scarce and fragmented. In order to fill this gap, the paper is aimed to identify different types of cyber...
-
Nitric Oxide-Dependent Pathways as Critical Factors in the Consequences and Recovery after Brain Ischemic Hypoxia
PublikacjaBrain ischemia is one of the leading causes of disability and mortality worldwide. Nitric oxide (NO), a molecule that is involved in the regulation of proper blood flow, vasodilation, neuronal and glial activity constitutes the crucial factor that contributes to the development of pathological changes after stroke. One of the early consequences of a sudden interruption in the cerebral blood flow is the massive production of reactive...
-
Machine Learning Techniques in Concrete Mix Design
PublikacjaConcrete mix design is a complex and multistage process in which we try to find the best composition of ingredients to create good performing concrete. In contemporary literature, as well as in state-of-the-art corporate practice, there are some methods of concrete mix design, from which the most popular are methods derived from The Three Equation Method. One of the most important features of concrete is compressive strength, which...
-
Preparation and Characterization of Indomethacin Supramolecular Systems with β-Cyclodextrin in Order to Estimate Photostability Improvement
PublikacjaCyclodextrins have found wide application in contemporary chemistry, pharmacy andmedicine. Because of their unique properties, cyclodextrins are constantly used in research on solubility or stability improvement, as well as other physicochemical properties of medicinal substances. Indomethacin (IND) is a photolabile molecule that also attracts the interest of researchers due to its therapeutic potential and the need to...
-
An Innovative Approach to the Forecasting of Energetic Effects While Wood Sawing
PublikacjaIn the classical approach, energetic effects (cutting forces and cutting power) of wood sawing process are generally calculated on the basis of the specifi c cutting resistance, which is in the case of wood cutting the function of more or less important factors. On the other hand, the cutting forces (power) problem may be tackled with an innovative, up-to-date fundamental analysis of the mechanics of sawing based on modern fracture mechanics....
-
An innovative approach to the forecasting of energetic effects while wood sawing
PublikacjaIn the classical approach, energetic effects (cutting forces and cutting power) of wood sawing process are generally calculated on the basis of the specific cutting resistance, which is in the case of wood cutting the function of more or less important factors. On the other hand, the cutting forces (power) problem may be tackled with an innovative, up-to-date fundamental analysis of the mechanics of sawing based on modern fracture...
-
Detection and Model of Thermal Traces Left after Aggressive Behavior of Laboratory Rodents
PublikacjaAutomation of complex social behavior analysis of experimental animals would allow for faster, more accurate and reliable research results in many biological, pharmacological, and medical fields. However, there are behaviors that are not only difficult to detect for the computer, but also for the human observer. Here, we present an analysis of the method for identifying aggressive behavior in thermal images by detecting traces...
-
System wykrywania i przeciwdziałania spoofingowi GPS
PublikacjaSpoofing w systemach nawigacji satelitarnej jest atakiem elektronicznym, który polega na nieuprawnionej emisji sygnałów stanowiących imitacje rzeczywistych sygnałów odbieranych z satelitów. Powoduje on wyznaczenie nieprawidłowych informacji o czasie, położeniu i prędkości odbiornika. Z uwagi na trudność jego wykrycia, spoofing stanowi poważniejsze zagrożenie niż proste zagłuszanie sygnałów zakłóceniem o dużej mocy (ang. jamming)....
-
Dominant Pathways of Adenosyl Radical-Induced DNA Damage Revealed by QM/MM Metadynamics
PublikacjaBrominated nucleobases sensitize double stranded DNA to hydrated electrons, one of the dominant genotoxic species produced in hypoxic cancer cells during radiotherapy. Such radiosensitizers can therefore be administered locally to enhance treatment efficiency within the solid tumor while protecting the neighboring tissue. When a solvated electron attaches to 8-bromoadenosine, a potential sensitizer, the dissociation of bromide...
-
Device-independent quantum key distribution based on measurement inputs
PublikacjaWe provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....
-
Advanced oxidation processes for the removal of mono and polycyclic aromatic hydrocarbons – A review
PublikacjaAromatic hydrocarbons (AHs) are toxic environmental contaminants presented in most of the environmental matrices. Advanced oxidation processes (AOPs) for the removal of AHs in the account of complete mineralization from various environmental matrices have been reviewed in this paper. An in-depth discussion on various AOPs for mono (BTEX) and polyaromatic hydrocarbons (PAHs) and their derivatives is presented. Most of the AOPs were...
-
Defending against Fake VIP in Scant-Transparency Information Systems with QoS Differentiation
PublikacjaIn client-server information systems with quality of service (QoS) differentiation, Client may deplete Server’s resources by demanding unduly high QoS level. Such QoS abuse has eluded systematic treatment; known defenses using Client authorization, payments, or service request inspection prior to QoS assignment, are heuristic and environment-specific. We offer a game-theoretic approach on the premise that a service request is occasionally...
-
Altruists will be altruists, but what about individualists? The role of future time perspective and social value orientation in volunteers’ declarations to continue engagement in three time horizons
PublikacjaVolunteering involves caring for the outcomes of others and typically long-term orientation so that one can achieve goals that are not always clearly visible in the short term. As with any activity, volunteering attracts people of different social value orientations – some rather individualistic, some rather altruistic. The aim of the study was to find out whether the future time perspective, which promotes thinking about future...
-
The Housing Pattern and Entrepreneurship in Polish Suburban Landscape
PublikacjaAbstract. Housing stimulates the development of SMEs (small and medium enterprises) in the suburbs. The multidisciplinary research in fields of urban planning and economics, carried out by the Authors, confirms this trend. The purpose of this paper is to present the multidisciplinary results of the research on the determinants of SME localization in the suburban areas of Gdansk, Gdynia and Sopot (the Metropolitan Area Gdansk–Gdynia-Sopot...
-
Studies on the formation of formaldehyde during 2-ethylhexyl 4-(dimethylamino)benzoate demethylation in the presence of reactive oxygen and chlorine species
PublikacjaIn order to protect the skin from UV radiation, personal care products (PCPS) often contain chemical UV-filters. These compounds can enter the environment causing serious consequences on the water ecosystems. The aim of this study was to examine, the effect of different factors, such as UV light, the presence of NaOCl and H2O2 on the formaldehyde formation during popular UV filter, 2-ethylhexyl 4-(dimethylamino)benzoate (ODPABA)...
-
Insight into the microstructural and durability characteristics of 3D printed concrete: Cast versus printed specimens
PublikacjaThis study presents the comparison of microstructural and durability characteristics of 3D printed concrete (3DPC) depending on its production method (printing or casting). Printed samples with different numbers of layers, as well as a cast specimen with an identical mix composition, were produced and compared, with their microstructural pore and solid characteristics quantitatively and qualitatively investigated. For this purpose,...
-
Multi-fidelity robust aerodynamic design optimization under mixed uncertainty
PublikacjaThe objective of this paper is to present a robust optimization algorithm for computationally efficient airfoil design under mixed (inherent and epistemic) uncertainty using a multi-fidelity approach. This algorithm exploits stochastic expansions derived from the Non-Intrusive Polynomial Chaos (NIPC) technique to create surrogate models utilized in the optimization process. A combined NIPC expansion approach is used, where both...
-
The oil film parameters of the wankel engine apex seal in aspects of durability of mating elements
PublikacjaThe Wankel engine is one of only few alternatives to the reciprocating engines. The advantages such as good value of maximum engine power to its mass ratio are still present and can have great sense in selected fields of application, for example General Aviation. Nevertheless the disadvantages of the Wankel engine design have never lost its importance and still pose an obstacle to wider use of the Wankel engine. One of the main...
-
Assessment of cardiovascular risk in assisted living
PublikacjaWady i choroby układu krążenia są jedną z podstawowych przyczyn problemów zdrowotnych oraz przyczyn śmierci. Wczesne ich wykrycie jest szczególnie cenne jako, że może zapobiec przez poważnymi incydentami (np. zawał, udar, itp.). W artykule przedstawiono nasobny system pomiarowy integrujący wiele pomiarów przydatnych do oceny problemów kardiologicznych.Disorders of the heart and blood vessels are the leading cause of health problems...
-
Refurbishment of a historical building - design issues
PublikacjaOver a 10-year modernization of the main building of Gdansk University of Technology is coming to the end. The ever increasing number of students requires not only the development of the campus with new facility buildings, also the existing buildings are subject to adaptation and modernization. In addition to high-impact solutions, as restoring the former glory of the building (reconstruction of the clock tower), or introducing...