Filtry
wszystkich: 1680
wybranych: 1237
-
Katalog
- Publikacje 1237 wyników po odfiltrowaniu
- Czasopisma 131 wyników po odfiltrowaniu
- Konferencje 82 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 43 wyników po odfiltrowaniu
- Projekty 9 wyników po odfiltrowaniu
- Kursy Online 16 wyników po odfiltrowaniu
- Wydarzenia 3 wyników po odfiltrowaniu
- Dane Badawcze 158 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: bathing security
-
Rating Prediction with Contextual Conditional Preferences
PublikacjaExploiting contextual information is considered a good solution to improve the quality of recommendations, aiming at suggesting more relevant items for a specific context. On the other hand, recommender systems research still strive for solving the cold-start problem, namely where not enough information about users and their ratings is available. In this paper we propose a new rating prediction algorithm to face the cold-start...
-
Current challenges and methodological issues of functional safety and security management in hazardous technical systems
PublikacjaCelem artykułu jest zidentyfikowanie problemów oceny ryzyka w kontekście stosowania systemów elektrycznych / elektronicznych / programowalnych elektronicznych (E/E/PE) z uwzględnieniem aspektów bezpieczeństwa funkcjonalnego i zabezpieczeń (ochrony). Zadaniem rozwiązań bezpieczeństwa funkcjonalnego jest efektywne redukowanie ryzyka wychodząc z poziomu nieakceptowanego. Ryzyko jest definiowane jako kombinacja prawdopodobieństwa wystąpienia...
-
Performance and Security Testing of Distributed Applications Working in Public/Private IPSec and HTTPS Environments
PublikacjaW pracy przedstawiono zagadnienie testowania wydajności (ang. Performance) i bezpieczeństwa (ang. Security) aplikacji rozproszonych działających w sieciach publiczno-prywatnych stworzonych przy wykorzystaniu technologii IPSec i HTTPS. Dwa podejścia do architektury oprogramowania tych aplikacji zostały omówione: Request/Response oraz Publish/Subscribe. Analiza zawiera przedstawienie wpływu technologii IPSec i HTTPS na całkowitą...
-
Machine Learning for Control Systems Security of Industrial Robots: a Post-covid-19 Overview
Publikacja -
A rough cut cybersecurity investment using portfolio of security controls with maximum cybersecurity value
Publikacja -
Determining and verifying the safety integrity level of the safety instrumented systems with the uncertainty and security aspects
PublikacjaSafety and security aspects consist of two different group of functional requirements for the control and protection systems. In the paper it is proposed that the security analysis results can be used as a factor increasing or decreasing the risk level. It concerns a process of determining required safety integrity level of given safety functions. The authors propose a new approach for functional safety risk analysis. In this case...
-
Benchmarking Scalability and Security Configuration Impact for A Distributed Sensors-Server IOT Use Case
PublikacjaInternet of Things has been getting more and more attention and found numerous practical applications. Especially important in this context are performance, security and ability to cope with failures. Especially crucial is to find good trade-off between these. In this article we present results of practical tests with multiple clients representing sensors sending notifications to an IoT middleware – DeviceHive. We investigate performance...
-
Multimedia Communications, Services and Security MCSS. 10th International Conference, MCSS 2020, Preface
PublikacjaMultimedia surrounds us everywhere. It is estimated that only a part of the recorded resources are processed and analyzed. These resources offer enormous opportunities to improve the quality of life of citizens. As a result, of the introduction of a new type of algorithms to improve security by maintaining a high level of privacy protection. Among the many articles, there are examples of solutions for improving the operation of...
-
Deep learning techniques for biometric security: A systematic review of presentation attack detection systems
PublikacjaBiometric technology, including finger vein, fingerprint, iris, and face recognition, is widely used to enhance security in various devices. In the past decade, significant progress has been made in improving biometric sys- tems, thanks to advancements in deep convolutional neural networks (DCNN) and computer vision (CV), along with large-scale training datasets. However, these systems have become targets of various attacks, with...
-
Pattern matching localization in ZigBee wireless sensor networks.
PublikacjaLokalizacja typu Pattern matching w sieciach sensorów bezprzewodowych ZigBee.Prezentacja metod implementacji algorytmów lokalizacji. Praktyczne zastosowanie i testowanie lokalizacji sieci ZigBee.
-
Matching Split Distance for Unrooted Binary Phylogenetic Trees
Publikacja -
Impedance matching in dual-frequency induction heating systems
Publikacja -
Selection of cutting and washing fluids as a method of waste minimization
PublikacjaW artykule przedstawiono wyniki testów korozyjności dla cieczy obróbkowych wykorzystywanych do produkcji przekładni skrzyni biegów. Testy prowadzono zgodnie z normami: DIN 51360-2 (Ford-test) oraz PN-92/M-55789. Badaniom poddano trzy ciecze obróbkowe oraz trzy ciecze chłodzące. Wraz ze spadkiem stężenia użytej cieczy, obserwowano większe ogniska korozji.
-
Improving web user experience with caching user interface
PublikacjaOften, Web technologies are used to operate or to configure network-enabled equipment, to configure and administer modular applications, or as teaching environments. The comfort of human work requires a similar response time in these applications as in the Internet. To improve response time, various forms of caching at different levels are employed. To improve the user experience in regard to response time when performing specific...
-
Improving web user experience with caching user interface
PublikacjaIn human-computer interaction, response time is assumed generally not to exceed significantly 1-2 seconds. While the natural competition in the Internet public Web serving ensures adhering widely to such limits, some Web environments are less competitive and offer much worse user experience in terms of response time. This paper describes a solution to significantly improve user experience in terms of response time with only modification...
-
Impulse and high frequency methods of lighting earthing testes.
PublikacjaUziemienia projektowane dla prądów zwarciowych nie zawsze są właściwe do odprowadzania prądów piorunowych, gdzie należy brać pod uwagę impedancję uziemień. W pracy porównano metody: udarową oraz wysokiej częstotliwości zastosowane do oceny przydatności uziemień odgromowych.
-
Dynamic Compatibility Matching of Services for Distributed Workflow Execution
PublikacjaThe paper presents a concept and an implementation of dynamic learn-ing of compatibilities of services used in a workflow application. While services may have the same functionality, they may accept input and produce output in different formats. The proposed solution learns matching of outputs and inputs at runtime and uses this knowledge in subsequent runs of workflow applications. The presented solution was implemented in an...
-
Matching Split Distance for Unrooted Binary Phylogenetic Trees
PublikacjaRekonstrukcja drzew ewolucji jest jednym z głównych celów w bioinformatyce. Drzewa filogenetyczne reprezentuje historię ewolucji i związki pokrewieństwa między różnymi gatunkami. W pracy proponujemy nową ogólną metodę określania odległości między nieukorzenionymi drzewami filogenetycznymi, szczególnie użyteczną dla dużych zbiorów gatunków. Następnie podajemy szczegółowe własności jednej metryki określonej przy użyciu tej metody...
-
FFT spectrum based matching algorithm for activedynamic thermography
PublikacjaIn Active Dynamic thermography (ADT) sequences of consecutive temperature distributions are analyzed. In biomedical applications of ADT, the problems of a patient's movements in front of a thermal camera should be eliminated before data analysis. Complete mechanical stabilization of the patients is impossible due to natural voluntary and involuntary moves caused by pulse breathing, etc. This paper presents a simple and efficient...
-
THE ASSESSMENT OF THE SITUATION IN BANKING SECTORS IN SELECTED EUROPEAN COUNTRIES
PublikacjaThe economic significance of the banking sector is well recognized in the theory and practice. In the literature there are discussed various topics concerning banking: banking sectors stability and its determinants, as well as influence of the banking sector on other sectors of the economy. Moreover the situation in the banking sector has been studied from different perspectives: its stability, profitability, efficiency, competition,...
-
Optimal backbone coloring of split graphs with matching backbones
PublikacjaFor a graph G with a given subgraph H, the backbone coloring is defined as the mapping c: V(G) -> N+ such that |c(u)-c(v)| >= 2 for each edge uv \in E(H) and |c(u)-c(v)| >= 1 for each edge uv \in E(G). The backbone chromatic number BBC(G;H) is the smallest integer k such that there exists a backbone coloring with max c(V(G)) = k. In this paper, we present the algorithm for the backbone coloring of split graphs with matching backbone.
-
Matching trajectory of a person to a map in inertial navigation system
PublikacjaPaper describes the method of matching, to a map, trajectories of a person walking indoors, obtained from inertial navigation module. General principle of matching algorithm based on particle filtering is presented. Method of detecting particle collisions is described as well. The last chapter provides test results of map matching related to a true trajectory.
-
Low Frequency Electromagnetic Interferences Impact on Transport Security Systems Used in Wide Transport Areas
Publikacja -
Assessment of Financial Security of SMEs Operating in the Renewable Energy Industry during COVID-19 Pandemic
Publikacja -
Bound entanglement maximally violating Bell inequalities: quantum entanglement is not fully equivalent to cryptographic security
PublikacjaW pracy pokazano, że czterokubitowy stan o splątaniu związanym może maksymalnie łamać prostą nierówność Bella podobną do standardowej nierówności CHSH. Prostota rozważanego układu oraz odporność splątania sprawiają, że łamanie to jest obiecujące dla współczesnej technologii eksperymentalnej. Z drugiej strony, splątanie tego stanu nie pozwala na destylację bezpiecznego klucza kryptograficznego, zatem ani splątanie, ani maksymalne...
-
Performance and Security Testing for Improving Quality of Distributed Applications Working in Public/Private Network Environments
PublikacjaThe goal of this dissertation is to create an integrated testing approach to distributed applications, combining both security and performance testing methodologies, allowing computer scientist to achieve appropriate balance between security and performance charakterstics from application requirements point of view. The constructed method: Multidimensional Approach to Quality Analysis (MA2QA) allows researcher to represent software...
-
Knowledge-based functional safety and security management in hazardous industrial plants with emphasis on human factors
PublikacjaExisting and emerging new hazards have significant potential to impact destructively operation of technical systems, hazardous plants, and systems / networks of critical infrastructure. The programmable control and protection systems play nowadays an important role in reducing and controlling risk in the process of hazardous plant operation. It is outlined how to deal with security related hazards concerning such systems to be...
-
Onychophagia: A Synopsis of Nail Biting and Its Management
Publikacja -
Onychophagia: A synopsis of nail biting and its management
Publikacja -
Further developments of parameterization methods of audio stream analysis for secuirty purposes
PublikacjaThe paper presents an automatic sound recognition algorithm intended for application in an audiovisual security monitoring system. A distributed character of security systems does not allow for simultaneous observation of multiple multimedia streams, thus an automatic recognition algorithm must be introduced. In the paper, a module for the parameterization and automatic detection of audio events is described. The spectral analyses...
-
Improvement of Imperfect String Matching Based on Asymetric n-Grams
PublikacjaTypical approaches to string comparing treats them as either different or identical without taking into account the possibility of misspelling of the word. In this article we present an approach we used for improvement of imperfect string matching that allows one to reconstruct potential string distortions. The proposed method increases the quality of imperfect string matching, allowing the lookup of misspelled words without significant...
-
Elastic Fender-Dolphin Interaction for Economic Design of Berthing Dolphins
PublikacjaThe study addresses the question of the possible design benefits when considering the interaction between a modern marine modular rubber fender and a steel tubular pile substructure of a berthing dolphin. Absorption of the berthing kinetic energy of the vessel by a dualelasticity pile-fender berthing system is described in detail using the interactive treatment method (ITM). Application of the ITM is illustrated by a calculative...
-
Variable length sliding models for banking clients face biometry
PublikacjaAn experiment was organized in 100 bank branches to acquire biometric samples from nearly 5000 clients including face images. A procedure for creating face verification models based on continuously expanding database of biometric samples is proposed, implemented, and tested. The presented model applies to circumstances where it is possible to collect and to take into account new biometric samples after each positive verification...
-
Size reduction of ultra-wideband antennas with efficiency and matching constraints
PublikacjaAntenna design is a multifaceted task that involves handling of various performance figures concerning both electrical performance of the structure as well as its geometry. Simultaneous control of several objectives through rigorous optimization is very challenging and virtually impossible through conventional approaches such as parameter sweeping. In this work, we investigate size reduction of ultra‐wideband antenna structures...
-
Matching Exception Class Hierarchies between .NET, Java Environments
PublikacjaThe paper presents a methodology of exception classification and matching exception messages between .NET andJava environments. The methodology operates on existing exception class hierarchies and proposes two complementingapproaches: automated and manual matching. The automated matching uses the similarity measure to find associationsbetween exception messages from the two sets of classes for the considered programming languages....
-
Development of banking sectors in Kosovo and Montenegro in the years 2000-2010
Publikacja -
Autonomous Energy Matching Control in an LLC Induction Heating Generator
Publikacja -
Dual-Frequency Induction Heating Generator With Adjustable Impedance Matching
Publikacja -
Comparing phylogenetic trees using a minimum weight perfect matching
PublikacjaA phylogenetic tree represents historical evolutionary relationshipbetween different species or organisms. There are various methods for reconstructing phylogenetic trees.Applying those techniques usually results in different treesfor the same input data. An important problem is to determinehow distant two trees reconstructed in such a wayare from each other. Comparing phylogenetic trees is alsouseful in mining phylogenetic information...
-
Tighter bounds on the size of a maximum P3-matching in a cubic graph
PublikacjaW pracy pokazano, że największe P3-skojarzenie dla dowolnego grafu o n>16 wierzchołkach składa się z przynajmniej 117n/152 wierzchołków.
-
Band misplacement: a rare complication of laparoscopic adjustable gastric banding
Publikacja -
The First Report on Hybrid NOTES Adjustable Gastric Banding in Human
Publikacja -
Real-Time Aerial Mapping by Image Features Extraction and Matching
Publikacja -
Hydroacoustic ships berthing aid systems in Gdańsk north harbour
PublikacjaManewry dobijania statków do nabrzeży portowych są trudnymi operacjami, przy których należy uwzględniać m. in. na pływy, wiatry, widzialność, prędkość, masę statku, odległość od pirsu. Ewentualna kolizja z pirsem niesie poważne konsekwencje, szczególnie groźne dla wielkich statków a zwłaszcza tankowców. Referat prezentuje hydroakustyczne systemy kontroli manewrów statków wykonane przez zespół pracowników Katedry Systemów Elektroniki...
-
Maturity Mismatch in the Polish Banking System and its Impact on the Economy
PublikacjaIn the article maturity mismatch in the Polish banking system is estimated based on the publicly available data. Then the impact on the economy is discussed. Based on Polish central bank’s data it may be estimated that between 1996 and 2012 the maturity gap increased significantly – average residual maturity of assets exceeds 6 years in 2012 (less than 2 years in 1996), while that of liabilities remains below 1 year. The gap...
-
Multi-objective antenna design by means of sequential domain patching
PublikacjaA simple yet robust methodology for rapid multiobjective design optimization of antenna structures has been presented. The key component of our approach is sequential domain patching of the design space which is a stencil-based search that aims at creating a path that connects the extreme Pareto-optimal designs, obtained by means of single-objective optimization runs. The patching process yields the initial approximation of the...
-
On the low-cost design of abbreviated multisection planar matching transformer
PublikacjaA numerically demanding wideband matching transformer composed of three nonuniform transmission lines (NUTLs) has been designed and optimized at a low computational cost. The computational feasibility of the design has been acquired through the exploitation of low-fidelity NUTL models in most steps of the design procedure and an implicit space mapping optimization engine, providing high accuracy results with only a handful of EM...
-
Localization of impulsive disturbances in audio signals using template matching
PublikacjaIn this paper, a new solution to the problem of elimination of impulsive disturbances from audio signals, based on the matched filtering technique, is proposed. The new approach stems from the observation that a large proportion of noise pulses corrupting audio recordings have highly repetitive shapes that match several typical “patterns”. In many cases a representative set of exemplary pulse waveforms can be extracted from the...
-
Development of banking sectors in Kosovo and Montenegro in the years 2000 - 2010
PublikacjaThe article presents main aspects of development of banking markets in two Balkan countries - Kosovo and Montenegro. Both of them are charaterised by similar recent history, both in political and economical fields. Their financial sectors have had to be built almost from scretch. The author describes stages of development of competition in the banking sectors, using the following ratios: performace, structure, liquidity. The data...
-
Evaluation of Decision Fusion Methods for Multimodal Biometrics in the Banking Application
PublikacjaAn evaluation of decision fusion methods based on Dempster-Shafer Theory (DST) and its modifications is presented in the article, studied over real biometric data from the engineered multimodal banking client verification system. First, the approaches for multimodal biometric data fusion for verification are explained. Then the proposed implementation of comparison scores fusion is presented, including details on the application...