Filtry
wszystkich: 2839
wybranych: 1653
-
Katalog
- Publikacje 1653 wyników po odfiltrowaniu
- Czasopisma 464 wyników po odfiltrowaniu
- Konferencje 80 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 66 wyników po odfiltrowaniu
- Projekty 10 wyników po odfiltrowaniu
- Kursy Online 431 wyników po odfiltrowaniu
- Dane Badawcze 134 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: SECURITY OF SEAPORTS
-
Operational analysis of threats to the security of NATO’s eastern flank. Context of hybrid activities
Publikacja -
THE SITUATION OF WOMEN IN THE POLISH LABOUR MARKET IN THE LIGHT OF CHANGES IN THE PENSION SECURITY SYSTEM
PublikacjaThe aim of the study is to examine the opinion of a group of women on their economic activity and decisions related to retirement. The first part of the article reviews previous research related to the economic activity of older people with a special focus on women. In the empirical part of the article, women’s opinions on issues related to retirement were analyzed. The research was carried out in 2016 on a sample of 45 women,...
-
Integrated approach for functional safety and cyber security management in maritime critical infrastructures
PublikacjaThe work is devoted important issues of the management in maritime critical infrastructure of functional safety analysis, in particular the safety integrity level (SIL) verification of safety functions to be implemented within the distributed control and protection systems with regard to cyber security aspects. A method based on quantitative and qualitative information is proposed for the SIL (IEC 61508, 61511) verification with...
-
INCREASING THE COUNTRY'S SECURITY AND PUBLIC TRANSPORT ACCESSIBILITY BY CREATING A NETWORK OF SMALL AIRPORTS
PublikacjaIt has been shown that by creating a network of small airports, it is possible to increase the communication accessibility of large population groups and the country's security, including safety at sea. The airports mentioned above may also be located on land considered to be weak from an engineering point of view. These include, for example, wetlands, swamps, flood embankments, poor coastal belt grounds, and reclaimed land. A...
-
Operating system security by integrity checking and recovery using write-protected storage
PublikacjaThe paper presents an Integrity Checking and Recovery (ICAR) system which protects file system integrity and automatically restores modified files. The system enables files cryptographic hashes generation and verification, as well as configuration of security constraints. All of the crucial data, including ICAR system binaries, file backups and hashes database are stored in a physically write protected storage to eliminate the...
-
Knowledge management and knowledge security—Building an integrated framework in the light of COVID‐19
PublikacjaAbstract. This paper presents a framework of knowledge risk management in the face of the COVID-19 crisis, derived from the literature on knowledge management, knowledge security and COVID-19. So far, both researchers and practitioners have focused on knowledge as an asset and their efforts have been aimed at the implementation of knowledge management in various organizational contexts. However, with increasing threats related...
-
Mini-Cave Automatic Virtual Environment Application in Security, Safety, and Defence Studies
PublikacjaThe aim of the article is to analyse the use of mini-Cave Automatic Virtual Reality Environment (mini-CAVE) in academic studies on security, safety, and defence. The literature review based on Web of Science database and the case study of the War Studies University research activities indicated the mini-CAVE can be used in two areas as a research infrastructure and as a didactic tool. It can be concluded that due to the development...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublikacjaThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Systems engineering approach to functional safety and cyber security of industrial critical installations
PublikacjaThis chapter addresses the systems engineering approach to integrated functional safety and cybersecurity analysis and management regarding selected references, standards and requirements concerning critical installations and their industrial automation and control system (IACS). The objective is to mitigate the vulnerability of industrial installations that include the information technology (IT) and the operational technology...
-
Remote task submission and publishing in BeesyCluster: security and efficiency of Web Service interface
PublikacjaPrezentujemy nowy system BeesyCluster, który stanowi łatwy w użyciu portal dostępowy do rozszerzalnej sieci usług wdrożonych i opublikowanych na klastrach/komputerach PC z wirtualnymi płatnościami za wykorzystanie usług. Administratorzy/użytkownicy mogą dołączać klastry/komputery PC dostępne poprzez SSH kliknięciem myszy bez konieczności dalszej konfiguracji na klastrze/komputerze PC udostępniającego. Ponadto, użytkownicy mogą...
-
Dynamics control of powered hydraulic roof supports in the underground longwall mining complex
Publikacja -
Experimental Study of the Rolling Friction Coefficient in Highly Loaded Supports of Rotary Kilns
Publikacja -
The New Silk Road: Seeking Opportunities for Polish Exports in the Chinese Market
Publikacja -
Information Extraction from Polish Radiology Reports using Language Models
PublikacjaRadiology reports are vital elements of directing patient care. They are usually delivered in free text form, which makes them prone to errors, such as omission in reporting radiological findings and using difficult-to-comprehend mental shortcuts. Although structured reporting is the recommended method, its adoption continues to be limited. Radiologists find structured reports too limiting and burdensome. In this paper, we propose...
-
Current challenges and methodological issues of functional safety and security management in hazardous technical systems
PublikacjaCelem artykułu jest zidentyfikowanie problemów oceny ryzyka w kontekście stosowania systemów elektrycznych / elektronicznych / programowalnych elektronicznych (E/E/PE) z uwzględnieniem aspektów bezpieczeństwa funkcjonalnego i zabezpieczeń (ochrony). Zadaniem rozwiązań bezpieczeństwa funkcjonalnego jest efektywne redukowanie ryzyka wychodząc z poziomu nieakceptowanego. Ryzyko jest definiowane jako kombinacja prawdopodobieństwa wystąpienia...
-
Performance and Security Testing of Distributed Applications Working in Public/Private IPSec and HTTPS Environments
PublikacjaW pracy przedstawiono zagadnienie testowania wydajności (ang. Performance) i bezpieczeństwa (ang. Security) aplikacji rozproszonych działających w sieciach publiczno-prywatnych stworzonych przy wykorzystaniu technologii IPSec i HTTPS. Dwa podejścia do architektury oprogramowania tych aplikacji zostały omówione: Request/Response oraz Publish/Subscribe. Analiza zawiera przedstawienie wpływu technologii IPSec i HTTPS na całkowitą...
-
Machine Learning for Control Systems Security of Industrial Robots: a Post-covid-19 Overview
Publikacja -
A rough cut cybersecurity investment using portfolio of security controls with maximum cybersecurity value
Publikacja -
Determining and verifying the safety integrity level of the safety instrumented systems with the uncertainty and security aspects
PublikacjaSafety and security aspects consist of two different group of functional requirements for the control and protection systems. In the paper it is proposed that the security analysis results can be used as a factor increasing or decreasing the risk level. It concerns a process of determining required safety integrity level of given safety functions. The authors propose a new approach for functional safety risk analysis. In this case...
-
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
PublikacjaBiometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...
-
Benchmarking Scalability and Security Configuration Impact for A Distributed Sensors-Server IOT Use Case
PublikacjaInternet of Things has been getting more and more attention and found numerous practical applications. Especially important in this context are performance, security and ability to cope with failures. Especially crucial is to find good trade-off between these. In this article we present results of practical tests with multiple clients representing sensors sending notifications to an IoT middleware – DeviceHive. We investigate performance...
-
Multimedia Communications, Services and Security MCSS. 10th International Conference, MCSS 2020, Preface
PublikacjaMultimedia surrounds us everywhere. It is estimated that only a part of the recorded resources are processed and analyzed. These resources offer enormous opportunities to improve the quality of life of citizens. As a result, of the introduction of a new type of algorithms to improve security by maintaining a high level of privacy protection. Among the many articles, there are examples of solutions for improving the operation of...
-
Catalysis on polymer supports: ESR of molybdenum (V) dispersed in poly(acrylic acid) matrices
Publikacja -
STABILITY AND LOAD BEARING CAPACITY OF A BARS WITH BUILT UP CROSS SECTION AND ELASTIC SUPPORTS
PublikacjaThe present paper is devoted to the numerical analysis and experimental tests of compressed bars with built–up cross section which are commonly used as a top chord of the roof trusses. The significant impact on carrying capacity for that kind of elements in case of out-of-plane buckling is appropriate choice of battens which are used to provide interaction between separate members. Linear buckling analysis results and nonlinear static...
-
Diffuse axonal injury – an interdisciplinary problem. Current knowledge and two case reports
Publikacja -
The evolving structure of Polish exports (1994-2010) - diversification of products and trade partners.
PublikacjaThis paper presents empirical evidence on the diversification process concerning Polish exports (1994–2010), compared to European and global samples of countries. It analyzes both the commodity structure of Polish trade and the geographical diversification of Poland’s trading partners. The analysis draws on highly disaggregated data on exports (HS 6 digit) and combines descriptive analysis with non-parametric, semi-parametric and...
-
THE APPLICATION OF KALMAN FILTERING TO PREDICT VERTICAL RAIL AXIS DISPLACEMENTS OF THE OVERHEAD CRANE BEING A COMPONENT OF SEAPORT TRANSPORT STRUCTURE
PublikacjaAs the devices designed to transport materials, the overhead cranes should meet certain geometric requirements for their operation to be safe. The presently available geodetic equipment, in particular total stations, provides opportunities for precise 3D measurements of coordinates of the controlled points. These coordinates make a basis for correcting the height of crane runway axes. The paper presents a method to calculate position...
-
Bound entanglement maximally violating Bell inequalities: quantum entanglement is not fully equivalent to cryptographic security
PublikacjaW pracy pokazano, że czterokubitowy stan o splątaniu związanym może maksymalnie łamać prostą nierówność Bella podobną do standardowej nierówności CHSH. Prostota rozważanego układu oraz odporność splątania sprawiają, że łamanie to jest obiecujące dla współczesnej technologii eksperymentalnej. Z drugiej strony, splątanie tego stanu nie pozwala na destylację bezpiecznego klucza kryptograficznego, zatem ani splątanie, ani maksymalne...
-
Performance and Security Testing for Improving Quality of Distributed Applications Working in Public/Private Network Environments
PublikacjaThe goal of this dissertation is to create an integrated testing approach to distributed applications, combining both security and performance testing methodologies, allowing computer scientist to achieve appropriate balance between security and performance charakterstics from application requirements point of view. The constructed method: Multidimensional Approach to Quality Analysis (MA2QA) allows researcher to represent software...
-
Low Frequency Electromagnetic Interferences Impact on Transport Security Systems Used in Wide Transport Areas
Publikacja -
Assessment of Financial Security of SMEs Operating in the Renewable Energy Industry during COVID-19 Pandemic
Publikacja -
Bezpieczeństwo Bankowości Internetowej Wobec Współczesnych Cyberzagrożeń = INTERNET BANKING SECURITY IN TERMS OF CONTEMPORARY CYBERTHREATS
PublikacjaW niniejszej pracy zostały opisane aktualne podejścia do zabezpieczeń bankowości internetowej. Przeanalizowane jest bezpieczeństwo bankowości internetowej 7 banków polskich wobec współczesnych rodzajów cyberataków (takich jak ataki na użytkowników niemieckich banków w 2017 roku z wykorzystaniem luk bezpieczeństwa w systemie SS7). Zaproponowane są dwa podejścia do zabezpieczeń ochrony środków klientów banku wobec tych zagrożeń
-
Knowledge-based functional safety and security management in hazardous industrial plants with emphasis on human factors
PublikacjaExisting and emerging new hazards have significant potential to impact destructively operation of technical systems, hazardous plants, and systems / networks of critical infrastructure. The programmable control and protection systems play nowadays an important role in reducing and controlling risk in the process of hazardous plant operation. It is outlined how to deal with security related hazards concerning such systems to be...
-
Folic Acid/Methotrexate Functionalized Mesoporous Silica Nanoflakes from Different Supports: Comparative Study
Publikacja -
Vibration-Based Diagnostics of Radial Clearances and Bolts Loosening in the Bearing Supports of the Heavy-Duty Gearboxes
Publikacja -
Deep eutectic solvents with solid supports used in microextraction processes applied for endocrine-disrupting chemicals
PublikacjaThe determination of endocrine-disrupting chemicals (EDCs) has become one of the biggest challenges in Analytical Chemistry. Due to the low concentration of these compounds in different kinds of samples, it becomes necessary to employ efficient sample preparation methods and sensitive measurement techniques to achieve low limits of detection. This issue becomes even more struggling when the principles of the Green Analytical Chemistry...
-
Adjusting the Stiffness of Supports during Milling of a Large-Size Workpiece Using the Salp Swarm Algorithm
PublikacjaThis paper concerns the problem of vibration reduction during milling. For this purpose, it is proposed that the standard supports of the workpiece be replaced with adjustable stiffness supports. This affects the modal parameters of the whole system, i.e., object and its supports, which is essential from the point of view of the relative tool–workpiece vibrations. To reduce the vibration level during milling, it is necessary to...
-
Regarding the “Is Surgery an Inevitable Treatment for Advanced Salivary Lymphoepithelial Carcinoma? Three Case Reports”
Publikacja -
Shifting from the EU’s production networks? Electronics industry exports of Central and Eastern Europe
Publikacja -
The role of the One-Belt One-Road initiative in China's exports and global value chains
PublikacjaResearch background: China is regarded as the “world factory” highly involved in international trade and plays an increasingly important role in the global value chains (GVC). Additionally, the “One-Belt One-Road” (OBOR) initiative was proposed by the Chinese government to further promote China in the international market. Purpose of the article: The article explores the role of the OBOR in China’s exports and global value...
-
Further developments of parameterization methods of audio stream analysis for secuirty purposes
PublikacjaThe paper presents an automatic sound recognition algorithm intended for application in an audiovisual security monitoring system. A distributed character of security systems does not allow for simultaneous observation of multiple multimedia streams, thus an automatic recognition algorithm must be introduced. In the paper, a module for the parameterization and automatic detection of audio events is described. The spectral analyses...
-
The Effects of Roadside Hazards on Road Accident Severity
PublikacjaThe risk of becoming involved in an accident emerges when elements of the transport system do not operate properly (man – vehicle – road – roadside). The road, its traffic layout andsafety equipment have a critical impact on road user safety. This gives infrastructural work a priority in road safety strategies and programmes. Run-off-road accidents continue to be one of the biggest problems of road safety with consequences including...
-
Indicator Analysis of Security Risk for Electronic Systems Used to Protect Field Command Posts of Army Groupings
Publikacja -
Issues Related to Power Supply Reliability in Integrated Electronic Security Systems Operated in Buildings and Vast Areas
Publikacja -
Shock a disposable time in electronic security systems / Porażenie a czas dyspozycyjny w elektronicznych systemach bezpieczeństwa
Publikacja -
Comparison of non-linear statical analysis of truss with linear and rotational side supports and 3d roof model
PublikacjaIn the paper geometrically non-linear analysis of example truss with linear and rotational elastic side supports is compared with geometrically non-linear analysis of part of the roof construction with purlins and truss-bracing. For different stiffness of side-supports a non linear relation between normal force in compressed chord due to out of truss plane displacement has been calculated.
-
Sleep Knowledge, Beliefs and Practices in Youth Sports Coaches and Science Support Staff
Publikacja -
Quantum key distribution based on private states: Unconditional security over untrusted channels with zero quantum capacity
PublikacjaIn this paper, we prove unconditional security for a quantum key distribution (QKD) protocol based on distilling pbits (twisted ebits) from an arbitrary untrusted state that is claimed to contain distillable key. Our main result is that we can verify security using only public communication-via parameter estimation of the given untrusted state. The technique applies even to bound-entangled states, thus extending QKD to the regime...
-
Zagrożenia starych budynków w sąsiedztwie nowej zabudowy = The threat of old buildings security in neighbourhood of new buildings
PublikacjaNa przykładzie jednego z budynków mieszkalnych, przedstawiono zagrożenia na jakie są narażone stare obiekty w zwartej zabudowie śródmiejskiej, podczas prowadzenia w ich sąsiedztwie prac budowlanych, którym często towarzyszą głębokie wykopy. Powoduje to powstawanie licznych uszkodzeń, uniemozliwiających ich prawidłową eksploatację lub stanowiących nawet zagrożenie bezpieczeństwa.
-
Architecture of security and application layer structure of radio system for monitoring and acquisition of data from traffic enforcement cameras
PublikacjaThe study presents architecture of security and application layer structure of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras. It also provides general assumptions concerning the range of the system as well as its modules and application components.