Filtry
wszystkich: 1542
wybranych: 1073
-
Katalog
- Publikacje 1073 wyników po odfiltrowaniu
- Czasopisma 1 wyników po odfiltrowaniu
- Konferencje 3 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 21 wyników po odfiltrowaniu
- Kursy Online 6 wyników po odfiltrowaniu
- Wydarzenia 4 wyników po odfiltrowaniu
- Dane Badawcze 433 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: ATTACK SCENARIO
-
Modelling Long‐Term Transition from Coal‐Reliant to Low‐Emission Power Grid and District Heating Systems in Poland
PublikacjaEnergy systems require technological changes towards climate neutrality. In Poland, where the power system is dominated by outdated coal-fired power plants, efforts to minimize the environmental impact are associated with high costs. Therefore, optimal paths for the development of the energy sector should be sought in order to achieve ambitious long-term strategic goals, while minimizing the negative impact on the consumers’ home...
-
Radio Channel Measurements in 868 MHz Off-Body Communications in a Ferry Environment
PublikacjaIn this paper, a characterization of the 868 MHz off-body radio channel in BANs is presented. Measurements were carried out in a ferry environment using a specific set-up. A method for path loss using radio distance measurements (RDMs) was developed. It allows to automate the measurements process and make it independent from the variable speed of a moving person. Based on the observed path loss as a function of distance, the obtained...
-
Structural Transformation to Attain Responsible BIOSciences (STARBIOS2): Protocol for a Horizon 2020 Funded European Multicenter Project to Promote Responsible Research and Innovation
Publikacja -
Structural Transformation to Attain Responsible BIOSciences (STARBIOS2): Protocol for a Horizon 2020 Funded European Multicenter Project to Promote Responsible Research and Innovation
Publikacja -
Fluorescence resonance energy transfer usage to track the sequence promoter changes in CGB5 gene in ovarian cancer patients
Publikacja -
Projektowanie, realizacja i eksploatacja attyk budynków mieszkalnych w aspekcie usterek i uszkodzeń cieplno-wilgotnościowych
PublikacjaW artykule przedstawiono w sposób syntetyczny zestawienie najbardziej istotnych zasad projektowania attyk w budynkach realizowanych w technologii tradycyjnej oraz tradycyjnej udoskonalonej. Zamieszczono zestawienie najczęściej popełnianych błędów wykonawczych oraz ich wpływ na rozkład pola temperatur w węzłach stropowo-ściennych. Zaproponowano rozwiązania projektowe ograniczając występowanie useterek cieplno-wilgotnościowech w...
-
LSA Is not Dead: Improving Results of Domain-Specific Information Retrieval System Using Stack Overflow Questions Tags
PublikacjaThe paper presents the approach to using tags from Stack Overflow questions as a data source in the process of building domain-specific unsupervised term embeddings. Using a huge dataset of Stack Overflow posts, our solution employs the LSA algorithm to learn latent representations of information technology terms. The paper also presents the Teamy.ai system, currently developed by Scalac company, which serves as a platform that...
-
Accuracy of Differential Phase Delay Estimation for GPS Spoofing Detection
PublikacjaGPS spoofing is an attack based on transmission of false signals to target receivers, in order to force the computation of incorrect time, position or velocity information. It is a threat which is recently considered with continuously growing awareness. There is a need for effective way of GPS spoofing detection. Many groups of methods are proposed in the literature. Spatial processing methods are considered to be robust in a wide...
-
60 GHz Microstrip Van Atta Arrays for Millimeter Wave Identification and Localization
Publikacja -
60 GHz Microstrip Van Atta Arrays for Millimeter Wave Identification and Localization
PublikacjaIn this paper performance comparison of co-polarized and cross-polarized microstrip Van Atta arrays working in the 60 GHz frequency range is presented. They can be treated as simple chipless RFID tags with frequency response based identification. Tags with three different nominal resonance frequencies of 57, 62 and 67 GHz are designed by scaling optimized base model. Designed 62 GHz co-polarized and cross-polarized arrays with...
-
Reducing Air Pollutant Emissions from the Residential Sector by Switching to Alternative Energy Sources in Single-Family Homes
PublikacjaThe paper discusses a scenario for adapting residential buildings to the requirements of the EU climate and energy package. It analyzes the option of reducing pollutant emissions to ambient air by switching to alternative energy sources in a typical single-family residential building. The most common sources of energy in central heating and ventilation systems and water heating systems were compared, and the analyzed energy carriers...
-
Characteristics of the polarised off-body channel in indoor environments
PublikacjaThis paper addresses the depolarisation effect in off-body body area networks channels, based on measurements performed at 2.45 GHz in an indoor environment. Seven different scenarios, involving both static and dynamic users, were considered, taking a statistical perspective. The analysis of the cross-polarisation discrimination is performed, as well as the analysis of path loss in co- and cross-polarised channels. Results show...
-
The dynamics of the total outputs of Japanese information and communication technology sectors: A further study
PublikacjaThe purpose of this study is to continue the previous studies which discussed the impacts of the changes of final demands on the total outputs of the Information and Communication Technology (ICT) sectors of the specific country. More specifically, this study aims to conduct a deeper analysis regarding these impacts. This study focuses on the case of Japan. This study employs a demand-pull Input-Output (IO) quantity model, one...
-
Damage Detection Strategies in Structural Health Monitoring of Overhead Power Transmission System
PublikacjaOverhead power transmission lines, their supporting towers, insulators and other elements create a highly distributed system that is vulnerable to damage. Typical damage scenarios cover cracking of foundation, breakage of insulators, loosening of rivets, as well as cracking and breakage of lines. Such scenarios may result from various factors: groundings, lightning strikes, floods, earthquakes, aeolian vibrations, conductors galloping,...
-
Testing the positioning accuracy of GNSS solutions during the tramway track mobile satellite measurements in diverse urban signal reception conditions
Publikacja -
Diagnostics of the tram track shape with the use of the global positioning satellite systems (GPS/Glonass) measurements with a 20 Hz frequency sampling
PublikacjaSatellite geodetic measurements used in the diagnosis of railway tracks require professional receivers and a very high frequency rate of data processing. It stems from a significant speed (10 km/h) kinematic measurements carried out during the passage of a measuring platform. The survey results (positions) of deformed railroad track have waveforms nature requiring additional processing methods and approximations. Due to the announcement...
-
Testing the Positioning Accuracy of GNSS Solutions during the Tramway Track Mobile Satellite Measurements in Diverse Urban Signal Reception Conditions
PublikacjaMobile Global Navigation Satellite System (GNSS) measurements carried out on the railway consist of using satellite navigation systems to determine the track geometry of a moving railway vehicle on a given route. Their purposes include diagnostics, stocktaking, and design work in railways. The greatest advantage of this method is the ability to perform measurements in a unified and coherent spatial reference system, which...
-
Simple Millimeter Wave Identification System Based on 60 GHz Van Atta Arrays
PublikacjaThe paper presents a proof-of-concept of a millimeter-wave identification system based on Van Atta array tags in the 60 GHz band. For interrogation of the tags, a vector network analyzer and a measurement transceiver were employed in alternative test configurations. The design, fabrication and measurements of co- and cross-polarized Van Atta arrays are presented in the paper. They can be treated as simple chipless RFID tags with...
-
INFLUENCE OF TACK WELDS DISTRIBUTION AND WELDING SEQUENCE ON THE ANGULAR DISTORTION OF TIG WELDED JOINT
PublikacjaIn this paper the influence of tack welds distribution and welding sequence on angular distortion of the Tungsten Inert Gas (TIG) welded joint was tested. Additionally, the effect of welding current on angular distortion was assessed. For research X2CrTiNb18 (AISI 441) stainless steel (2.5 mm thick) was chosen. During research specimens were prepared with different distributionsof tack...
-
Fading Analysis in Off-Body Channels in a Straight Metallic Corridor in a Passenger Ferry Environment
PublikacjaThis paper presents a fading analysis for Body Area Networks off-body communications at 2.45 GHz in a passenger ferry environment. The results are based on measurements performed for dynamic scenarios in a straight metallic corridor. Two components, extracted from instantaneous system loss values, have been analysed: small- and large-scales fading, separately for each scenario. Well-known probability distribution functions have...
-
Validation of a virtual test environment for C2X communication under radio jamming conditions
PublikacjaIn this paper, we propose a novel car-2-x communication security testing methodology in the physical layer of wireless systems. The approach is dedicated to automated testing of autonomous vehicles and it is essential for such complex systems operation, especially with regard to safety and security issues. It is based on scenario-driven testing in virtual and real test environments created from collected or simulated data. The...
-
Quality Model for Integrated Security Monitoring and Control in Water Distribution Systems
PublikacjaThis article addresses the problem of drinking water distribution system (DWDS) security in the terms of water quality which in the era of terrorist threat is of high importance to the public. The contribution of this paper is the development of the so called security module to extend a multi-species water quality model. This gives an insight to the situation in DWDS not only under normal operational conditions but also in case...
-
Regulacja osi toru w warunkach pomiarów satelitarnych :(program badań) = Geometrical adjustment of the railway track in the conditions of the satellite surveying : (research program)
PublikacjaW pracy zwrócono uwagę na uwarunkowania związane z zastosowaniem technik pomiarów satelitarnych GPS w pomiarach inwentaryzacyjnych linii kolejowych. Wskazano na konieczność nawiązania współpracy pomiędzy specjalistami z dziedziny pomiarów satelitarnych i środowiskiem kolejowym. Może to spowodować radykalną poprawę w zakresie poziomu utrzymania kształtu geometrycznego torów, gdzie występująca obecnie sytuacja budzi poważne zastrzeżenia....
-
Mn-Co spinel coatings on Crofer 22 APU by electrophoretic deposition: Up scaling, performance in SOFC stack at 850 °C and compositional modifications
PublikacjaCeramic coatings for metallic interconnects play a key role in limiting corrosion and chromium evaporation in solid oxide cells. This study presents the upscaling of the electrophoretic deposition (EPD) technique to process Mn-Co spinels on real-dimension Crofer 22 APU interconnects and the test in a SOFC stack. Area specific resistance of long-term test conducted for 5000 h at 850 °C demonstrated that two-steps sintering has a...
-
Ways of performing judo throws, and their efficiency, assessed in the open weight category in All-Japan Judo Championships
PublikacjaThere is no indication that earlier individual attempts in this area have been carried out in Japan. Judo masters including Kano, Koizumi, Kudo, Mifune, Tomiki and others have tried to introduce additional criteria to the classification. The need for so many modifications is a result of the many sport and referee rule changes, as well as to ensure the safety of competitors and to increase the attractiveness of judo contests. Purpose...
-
Computer Simulation in Predicting Biochemical Processes and Energy Balance at WWTPs
PublikacjaNowadays, the use of mathematical models and computer simulation allow analysis of many different technological solutions as well as testing various scenarios in a short time and at low financial budget in order to simulate the scenario under typical conditions for the real system and help to find the best solution in design or operation process. The aim of the study was to evaluate different concepts of biochemical processes and...
-
Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents
PublikacjaElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...
-
EE-ISAC—Practical Cybersecurity Solution for the Energy Sector
PublikacjaA recent survey of cybersecurity assessment methods proposed by the scientific community revealed that their practical adoption constitutes a great challenge. Further research that aimed at identifying the reasons for that situation demonstrated that several factors influence the applicability, including the documentation level of detail, the availability of supporting tools, and the continuity of support. This paper presents the...
-
Automatic music genre classification based on musical instrument track separation / Automatyczna klasyfikacja gatunku muzycznego wykorzystująca algorytm separacji dźwięku instrumentó muzycznych
PublikacjaThe aim of this article is to investigate whether separating music tracks at the pre-processing phase and extending feature vector by parameters related to the specific musical instruments that are characteristic for the given musical genre allow for efficient automatic musical genre classification in case of database containing thousands of music excerpts and a dozen of genres. Results of extensive experiments show that the approach...
-
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublikacjaCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...
-
Amplifying the Randomness of Weak Sources Correlated With Devices
PublikacjaThe problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...
-
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublikacjaAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
Wczesne wykrywanie spoofingu GNSS typu carry-off
PublikacjaW referacie przedstawiono klasyfikację ataków typu spoofing ukierunkowanych na odbiorniki satelitarnych systemów nawigacyjnych GNSS. W szczególności opisano zaawansowaną formę spoofingu w wariancie tzw. carry-off, polegającym na płynnym przejęciu kontroli nad blokami śledzenia sygnałów w zakłócanym odbiorniku. Sposób realizacji takiego ataku istotnie utrudnia jego wykrycie z użyciem metod dotychczas proponowanych w literaturze....
-
Innovative mobile method to determine railway track axis position in global coordinate system using position measurements performed with GNSS and fixed base of the measuring vehicle
Publikacja -
Innovative mobile method to determine railway track axis position in global coordinate system using position measurements performed with GNSS and fixed base of the measuring vehicle
PublikacjaThe shape of the railway track axis and its position in the global coordinate system are essential when defining design parameters of the railway. Correct reconstruction of these quantities is vital for both verifying the compliance of real track parameters with the design and for diagnosing, as all track deformations can also be defined as deviations of real parameters from their design values. The measurements of quantities related...
-
Współczesne trendy i strategie rozwoju Mieszkalnych Obiektów Pływających w Polsce
PublikacjaPodjęty w rozprawie temat Współczesne trendy i strategie rozwoju Mieszkalnych Obiektów Pływających w Polsce miał na celu zebranie i usystematyzowanie wiedzy z zakresu budownictwa nawodnego oraz określenie potencjalnej wizji przyszłości w celu opracowania strategii rozwoju Mieszkalnych Obiektów Pływających uwzględniającej wszystkie sfery otoczenia zewnętrznego. W pracy przedstawiono złożoność problemu budownictwa nawodnego, dokonano...
-
Instantaneous impedance monitoring of AA 7075 aluminum alloy corrosion in borate buffer with admixed chloride ions
PublikacjaThe study presents a research capabilities of Dynamic Electrochemical Impedance Spectroscopy (DEIS) as a tool used for instantaneous on-line monitoring of corrosion processes on the example of AA 7075 aluminum alloy. A borate buffer with admixed chloride ions in a quantity ranging from 0.05 to 25 mM was used to represent different types of corrosion attack. The surface of samples specimens was evaluated before and after the tests...
-
Influence of User Mobility and Antenna Placement on System Loss in B2B Networks
PublikacjaIn this paper, the influence of user mobility and on-body antenna placement on system loss in body-to-body communications in indoor and outdoor environments and different mobility scenarios is studied, based on system loss measurements at 2.45 GHz. The novelty of this work lies on the proposal of a classification model to characterise the effect of user mobility and path visibility on system loss, allowing to identify the best...
-
On the Role of Polarimetric Decomposition and Speckle Filtering Methods for C-Band SAR Wetland Classification Purposes
PublikacjaPrevious wetlands studies have thoroughly verified the usefulness of data from synthetic aperture radar (SAR) sensors in various acquisition modes. However, the effect of the processing parameters in wetland classification remains poorly explored. In this study, we investigated the influence of speckle filters and decomposition methods with different combinations of filter and decomposition windows sizes on classification accuracy....
-
Service-based Resilience via Shared Protection in Mission-critical Embedded Networks
PublikacjaMission-critical networks, which for example can be found in autonomous cars and avionics, are complex systems with a multitude of interconnected embedded nodes and various service demands. Their resilience against failures and attacks is a crucial property and has to be already considered in their design phase. In this paper, we introduce a novel approach for optimal joint service allocation and routing, leveraging virtualized...
-
Comparison of the Ability of Neural Network Model and Humans to Detect a Cloned Voice
PublikacjaThe vulnerability of the speaker identity verification system to attacks using voice cloning was examined. The research project assumed creating a model for verifying the speaker’s identity based on voice biometrics and then testing its resistance to potential attacks using voice cloning. The Deep Speaker Neural Speaker Embedding System was trained, and the Real-Time Voice Cloning system was employed based on the SV2TTS, Tacotron,...
-
Three-dimensional CFD modeling of a steam ejector
Publikacja -
Car-sharing: The Impact on Metropolitan Spatial Structures
PublikacjaMany examples from the past show that new technologies designed to solve particular problems can also create side effects generating new problems. Some unforeseen or unwanted results may influence space use and spatial structures. Car-sharing is an invention to compete with car ownership. It drastically rise efficiency of car use, reducing the number of vehicles per users. Diffusion of car-sharing is going to accelerate in the...
-
Nitrogen mass balance and mathematical model of a Structured- Bed Reactor (SBRRIA)
PublikacjaAn up-flow structured-bed reactor subjected to recirculation and intermittent aeration (SBRRIA) was operated under varying influent conditions. The influent COD/N ratio was adjusted by maintaining a stable organic loading rate (average of 1.07 kgCOD m-3 d-1) and changing the nitrogen loading rate from 0.1 to 0.4 kg N m-3. Therefore, three different COD/N ratios were tested: 9.7±1 (Scenario 1); 7.6±1 (Scenario 2) and 2.9±1 (Scenario...
-
Simulation model for evaluation of QOS dynamic routing
PublikacjaCurrent informational networks use a large variety of technologies to support data exchange. Most of them are focused on IP protocol and include mechanisms which by definition should supply demanded QoS. One of those mechanisms is efficient path calculation - routing. Traffic offered to the network can change very rapidly in short term. Routing should support such traffic changes and all the time calculate valid paths in terms...
-
Fading Modelling in Dynamic Off-Body Channels
PublikacjaThis paper presents an off-body fading channel model for Body Area Networks (BANs) in indoor environments. The proposed model, which is based on both simulations and measurements in a realistic environment, consists of three components: mean path loss, body shadowing, and multipath fading. Seven scenarios in an indoor environment (a medium-size room with furniture, mostly consisting of wooden tables and chairs) have been measured:...
-
An Off-Body Channel Model for Body Area Networks in Indoor Environments
PublikacjaThis paper presents an off-body channel model for body area networks (BANs) in indoor environments. The proposed model, which is based on both simulations and measurements in a realistic environment, consists of three components: mean path loss, body shadowing, and multipath fading. Seven scenarios in a realistic indoor office environment containing typical scatterers have been measured: five were static (three standing and two...
-
Emotion Recognition and Its Applications
PublikacjaThe paper proposes a set of research scenarios to be applied in four domains: software engineering, website customization, education and gaming. The goal of applying the scenarios is to assess the possibility of using emotion recognition methods in these areas. It also points out the problems of defining sets of emotions to be recognized in different applications, representing the defined emotional states, gathering the data and...
-
Hybrid no-signaling-quantum correlations
PublikacjaFundamental investigations in non-locality have shown that while the no-signaling principle alone is not sufficient to single out the set of quantum non-local correlations, local quantum mechanics and no-signaling together exactly reproduce the set of quantum correlations in the two-party Bell scenario. Here, we introduce and study an intermediate hybrid no-signaling quantum set of non-local correlations that we term HNSQ in the...
-
Simulation Environment in Python for Ship Encounter Situations
PublikacjaTo assess the risk of collision in radar navigation distance-based safety measures such as Distance at the Closest Point of Approach and Time to the Closest Point of Approach are most commonly used. Also Bow Crossing Range and Bow Crossing Time measures are good complement to the picture of the meeting situation. When ship safety domain is considered then Degree of Domain Violation and Time to Domain Violation can be applied. This...