Filtry
wszystkich: 604
wybranych: 566
-
Katalog
Filtry wybranego katalogu
Wyniki wyszukiwania dla: TERRORIST ATTACK
-
Bioterrorism — characteristics and possibilities of prevention
PublikacjaIn the paper bioterrorist threats have been presented. Historical background and possible methods of attacks have been described. The most dangerous pathogens and disease entities have been classified. Selected methods of detection and identification of biological weapon have been presented. The wireless system for threats monitoring — developed at Gdansk University of Technology — has been described.
-
Applicability of null-steering for spoofing mitigation in civilian GPS
PublikacjaCivilian GPS signals are currently used in many critical applications, such as precise timing for power grids and telecommunication networks. Spoofing may cause their improper functioning. It is a threat which emerges with the growing availability of GPS constellation simulators and other devices which may be used to perform such attack. Development of the effective countermeasures, covering detection and mitigation, is necessary...
-
Receiver-side fingerprinting method for color images based on a series of quaternion rotations
PublikacjaThe proposed method is a new Joint Fingerprinting and Decryption (JFD) method that uses a cipher based on quaternion rotation to encrypt color images that are then sent to all users via multicast transmission. Individual encryption keys depend on the users’ fingerprints, so that a unique fingerprint is introduced into the image during decryption for each decryption key. A simulation-based research was conducted to examine the method’s...
-
PTR-MS and electronic nose application for volatile fraction analysis of cigar tobacco
PublikacjaCigar consumers attach great importance to the quality of these products. At the same time, cigars are often expensive, so destructive analytical methods of quality control are not being desired. However, it has been found that there are many volatile organic compounds in their headspace. Because of that, proton transfer reaction–mass spectrometry and electronic nose were used to analyse it. The obtained results were used to distinguish...
-
Accuracy of Differential Phase Delay Estimation for GPS Spoofing Detection
PublikacjaGPS spoofing is an attack based on transmission of false signals to target receivers, in order to force the computation of incorrect time, position or velocity information. It is a threat which is recently considered with continuously growing awareness. There is a need for effective way of GPS spoofing detection. Many groups of methods are proposed in the literature. Spatial processing methods are considered to be robust in a wide...
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublikacjaThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
Receiver-side fingerprinting method based on quaternion sandwich product
PublikacjaIn this paper a new receiver-side fingerprinting method for color images is proposed. The proposed method belongs to the group of Joint Fingerprinting and Decryption (JFD) methods. Each component of the color image is represented as a point in 3D space, which is formed by 3 color channels. Encryption and fingerprinting can be interpreted as rotation, scaling and translation of these points. Calculations are performed using quaternion...
-
Impedance monitoring of fuel cell stacks
PublikacjaThis paper presents an innovative, electrochemical impedance method for monitoring of electrochemical behaviour of a multi-cell, direct methanol fuel cell (DMFC) device. This method not only provides classical voltage changes at successive cells but also allows their detailed impedance behaviour to be presented. Impedance characteristics of individual cells within a fuel cell stack (depending on actual operating conditions) are...
-
Framework for extracting rails and setting-out railway line axis based on UAV photogrammetric measurements
PublikacjaTechnical diagnostics enables assessing the current technical condition of a railway line and adjacent infrastructure, and forecasting its changes over a specific time horizon. One of its elements is the periodic monitoring of rail position and their geometry. This article presents a new framework for the setting-out of a railway track axis. The process presented in the manuscript is based on the specific filtration and extraction...
-
Approach to security assessment of critical infrastructures' information systems
PublikacjaThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
High temperature corrosion of evaporator tubes with thermal sprayed coatings
PublikacjaDegradation examinations of outer surface of low-emission steam boiler evaporator tubes are presented in the paper. Metallographic evaluation of scale morphology, its micro sites chemical composition analysis and distribution of elements on cross sections have been performed. Water-wall tubes were exposed in steam boiler for up to two years period. Common tubes made of 16Mo3 steel suffered sulphide and molten salts corrosions....
-
Adapting the pinch point analysis to improve the ORC design process
PublikacjaPinch point analysis can be adapted so as to assist in the early stages of designing the ORC systems. Typically used in determining the working parameters of heat exchangers, it can be employed to improve the heat fitting between the source of heat and the working fluids of the ORC system. To attain the parametric match, an algorithm was built enabling quick estimation of the possible heat reception by the specific working fluid....
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublikacjaAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
A Multi-Antenna Scheme for Early Detection and Mitigation of Intermediate GNSS Spoofing
PublikacjaThis article presents a method for detecting and mitigating intermediate GNSS spoofing. In this type of attack, at its early stage, a spoofer transmits counterfeit signals which have slight time offsets compared to true signals arriving from satellites. The anti-spoofing method proposed in this article fuses antenna array processing techniques with a multipath detection algorithm. The latter is necessary to separate highly correlated...
-
Enzymatic activities behind degradation of glucosinolates
PublikacjaMyrosinase (thioglucosidase, EC 3.2.1.147) is the enzyme responsible for the hydrolysis of glucosinolates (GLs). In plant tissue, myrosinase and GLs are sequestered in separate cellular compartments. As a result of cell disruption, e.g., after pathogen attack or on chopping or grinding during food preparation, the myrosinase comes into contact with GLs and catalyzes the hydrolysis of thioglucosidic bond in GL structure. Consequently,...
-
Practical issues for the implementation of survivability and recovery techniques in optical networks
PublikacjaFailures in optical networks are inevitable. They may occur during work being done for the maintenance of other infrastructures, or on a larger scale as the result of an attack or large-scale disaster. As a result, service availability, an important aspect of Quality of Service (QoS), is often degraded. Appropriate fault recovery techniques are thus crucial to meet the requirements set by the Service Level Agreements (SLAs) between...
-
Design of compound curves adapted to the satellite measurements
PublikacjaThe paper deals with a novelty related to the design of a region for an alternative railway track direction adequate for mobile satellite measurements. The new approach may become particularly useful in the design of the existing track axis control when the determination of both the main track directions becomes impossible. The only solution in that case is to apply to the geometrical system two circular arcs of a different radius,...
-
The process of identification of the track's geometrical layout and the alignment project based on the of satellite measurements
PublikacjaIn the paper a methodology of restoring of railway track’s geometrical shape in a horizontal plane on the base of conducted mobile satellite surveying was presented. The authors proposed a calculating algorithm for designing the track sections placed in horizontal arcs. In the algorithm an analytical methodology with mathematical formulas is applied. The procedure has an universal character, i.e. provides the possibility of varying...
-
Investigation of continuous wave jamming in an IEEE 802.15.4 network
PublikacjaThis paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate...
-
Optimal shape design of multi-element trawl-doors using local surrogate models
PublikacjaTrawl-doors have a large influence on the fuel consumption of fishing vessels. Design and optimiza-tion of trawl-doors using computational models are a key factor in minimizing the fuel consump-tion. This paper presents an optimization algorithm for the shape design of trawl-door shapes using computational fluid dynamic (CFD) models. Accurate CFD models are computationally expensive. Therefore, the direct use of traditional optimization...
-
Graph security testing
PublikacjaSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
Multisine impedimetric monitoring with an in-depth distribution of relaxation times analysis of WE43 and AZ31 magnesium alloys corrosion
PublikacjaThis research aims to develop and utilize an impedance-based tool for monitoring non-stationary electrochemical processes, coupling the multisinusoidal perturbation signal approach and distribution of relaxation times (DRT) analysis for the first time. The approach was used to distinguish independent processes occurring at the surface of AZ31 and WE43 Mg alloys undergoing corrosion in Hank’s Balanced Salt Solution at 37 °C. We...
-
Interpolation methods in GPR tomographic imaging of linear and volume anomalies for cultural heritage diagnostics
PublikacjaThis paper presents results of a ground penetrating radar (GPR) survey conducted in St. Joseph’s Church in Gdańsk, Poland. The aim of the study was to produce tomographic imaging of a renovated floor as well as the objects buried under the floor to detect linear and volume inclusions. The assumed track spacing was meaningfully greater than the single signal spacing in each track, which induced the need for interpolation methods...
-
Assessment of Subsoil Subsidence Under the Railway Surface with the Use of Fuzzy Sets
PublikacjaThe cause of the subsidence of the railway track is the subsidence of the track bed itself and it is often related to the subsidence of the subsoil. Such settlement leads to: uneven longitudinal railways and track twist. These phenomena have a negative impact on the comfort and safety of driving, and in extreme cases lead to a train derailment. It has been shown that the magnitude of these settlements is determined by many parameters...
-
Safety at railway level crossings and Vision Zero
PublikacjaIn this work, safety analysis at the railway level crossings is presented using advanced mathematical modelling. Resistivity of track subgrade panels is taken into account. The analysis does not refer to the assessment of the current regulations. Specific cases of generalized dynamic system are considered by introducing operations S=Δ, S=P defined in space C(N) of real sequences. In this model, generalized discrete exponential...
-
Security and Anonymity in Agent Systems
PublikacjaMany agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...
-
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics
PublikacjaThe contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...
-
Amplifying the Randomness of Weak Sources Correlated With Devices
PublikacjaThe problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...
-
Influence of permanent magnetic field on wear performance of dry sliding contacts
PublikacjaResults of experimental studies concerning the influence of permanent magnetic field on wear of dry sliding contact are presented.It was found that magnetic field of horizontal orientation is causing temporary reduction of material's hardness. It also facilitates and accelerates removal process of wear particles from the contact zone.Formation of bulges, consisting of accumulated and compacted anti-ferromagnetic material produced...
-
Technical diagnostics and monitoring of traction current collectors
PublikacjaNew evaluation methods of the technical condition of rolling stock current collectors are proposed in this paper. The method of automatic measurement of the pantograph static force characteristic, realized when the vehicle runs through the test section of the track with especially prepared overhead line height distribution, has been practically implemented by the Polish Railways. The method of testing the slipper spring suspension...
-
Efekty egoistycznych ataków na poziomie mac w sieciach ad hoc o topologii wieloskokowej
PublikacjaStacje sieci ad hoc mogą manipulować parametrami dostępu do medium transmisyjnego dla osiągnięcia nienależnie wysokiej jakości usług. Dla środowiska sieci ad hoc o topologii wieloskokowej rozważane są ataki na mechanizmy odłożenia transmisji i klasyfikacji ruchu, przeprowadzane zarówno w stosunku do przepływów źródłowych jak i tranzytowych. Wyniki pozwalają wstępnie ocenić efekty takich ataków oraz skuteczność mechanizmów obronnych.
-
Teams tools. Leading high-performance teams with different types of intelligence
PublikacjaThe subject of this paper is the analysis of necessary tools for global teams, image of the team leader, styles of leadership in global teams. The analysis is based on selected examples from high-performance teams with visible results. The purpose of the work is to answer for the following questions: What are the characteristics of the leading global teams? Which style of leadership use the global teams? Is a female leader different...
-
Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment
PublikacjaThe smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...
-
Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks
PublikacjaThe increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated...
-
The effect of pre-hydrogen charging on corrosion behaviour of superduplex stainless steel welded joints
PublikacjaThe paper presents results of research undertaken to determine the influence of hydrogen on passivity and corrosion resistance of 2507 super duplex stainless steel welded joints. Butt welded joints were made with low heat input using flux corded arc welding (FCAW) method. Coupons of 5.0 x 5.0 mm were cut from the welded joints containing weld metal (WM), heat affected zone (HAZ) and parent metal (PM). Hydrogen was introduced...
-
EE-ISAC—Practical Cybersecurity Solution for the Energy Sector
PublikacjaA recent survey of cybersecurity assessment methods proposed by the scientific community revealed that their practical adoption constitutes a great challenge. Further research that aimed at identifying the reasons for that situation demonstrated that several factors influence the applicability, including the documentation level of detail, the availability of supporting tools, and the continuity of support. This paper presents the...
-
Opinia techniczna rozjazdu zwyczajnego Rz 49E1-190-1:9 z szynami ochronnymi
PublikacjaOpinia techniczna rozjazdu zwyczajnego Rz 49E1-190-1:9 z szynami ochronnymi dla firmy TRACK TEC KOLTRAM
-
Tonality Estimation and Frequency Tracking of Modulated Tonal Components
PublikacjaA novel method for tonality estimation and frequency tracking of tonal components modulated in frequency and amplitude is presented. The algorithm detects the local maxima of magnitude spectra corresponding to three contiguous frames of a signal and matches them into the tonal track candidates. The magnitude-based and phase-based methods are used to estimate the frequency jumps between spectrum maxima belonging to the tonal track...
-
Research project BRIK: development of an innovative method for determining the precise trajectory of a railway vehicle
PublikacjaIn the paper the essential assumptions regarding a research project implemented by a consortium of Gdansk University of Technology and Gdynia Maritime University are presented. The project has been commissioned by National Center of Research and Development with cooperation with Polish Railways (PKP Polskie Linie Kolejowe S.A.). The project is focused in implementation of modern measurement techniques using Global Navigation Positioning...
-
Selektywne zakłócanie transmisji OFDM w interfejsie radiowym NB-IoT
PublikacjaW artykule przedstawiono zagadnienie tzw. inteligentnego zagłuszania, polegającego na selektywnym zakłócaniu krytycznych składowych sygnału OFDM. Opisane zostały badania weryfikujące możliwość przeprowadzenia tego rodzaju ataku elektronicznego. Przedstawiono zrealizowane stanowisko badawcze, umożliwiające zakłócanie rzeczywistych sygnałów NB-IoT w łączu w dół. Wyniki badań wykazują możliwość realizacji selektywnego zagłuszania...
-
Correction of determined coordinates of railway tracks in mobile satellite measurements
PublikacjaThis article examines one of the basic issues related to the technique of mobile satellite measurements in railway tracks. This problem concerns the correction of the determined coordinates of the track centerline. The need to perform this operation results from the GNSS receivers positioning at a certain height above the level of the existing track axis, leading to longitudinal and lateral shifts of antennas. The key problem here...
-
Implementation of DEIS for reliable fault monitoring and detection in PEMFC single cells and stacks
PublikacjaDynamic Electrochemical Impedance Spectroscopy (DEIS) was presented as novel method for diagnostic and monitoring of PEMFC stack and single cells operation. Impedance characteristics were obtained simultaneously with current - voltage characteristics for stack and each individual cell. Impedance measurements were performed in galvanodynamic mode. It allowed to compare performance of each cell and identification of faulty cell operation...
-
Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures
PublikacjaIn the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...
-
Electron attachment to hexafluoropropylene oxide (HFPO)
PublikacjaWe probe the electron attachment in hexafluoropropylene oxide (HFPO), C3F6O, a gas widely used in plasma technologies. We determine the absolute electron attachment cross section using two completely different experimental approaches: (i) a crossed-beam experiment at single collision conditions (local pressures of 5 × 10−4 mbar) and (ii) a pulsed Townsend experiment at pressures of 20–100 mbar. In the latter method, the cross sections...
-
How to fund an additional secular function in the monumental church?
PublikacjaThe implementation of a new public function into the non-used church spaces like attics or cellars in context of revitalizing a lawfully protected historical city areas have diversified aspects. The article describes the financial aspect of adaptation of omitted spaces of monumental sacral buildings by presenting funding possibilities in the European Union countries available in period of 2017-2018 and the funds planned for the...
-
Power equalization of AES FPGA implementation
PublikacjaThis paper briefly introduces side channel attacks on cryptographic hardware with special emphasis on differential power analysis(DPA). Based on existing countermeasures against DPA, design method combining power equalization for synchronous and combinatorialcircuits has been proposed. AES algorithm has been implemented in Xilinx Spartan II-E field programmable gate array (FPGA) deviceusing the standard and power-equalized methods....
-
An innovative approach to the forecasting of energetic effects while wood sawing
PublikacjaIn the classical approach, energetic effects (cutting forces and cutting power) of wood sawing process are generally calculated on the basis of the specific cutting resistance, which is in the case of wood cutting the function of more or less important factors. On the other hand, the cutting forces (power) problem may be tackled with an innovative, up-to-date fundamental analysis of the mechanics of sawing based on modern fracture...
-
An Innovative Approach to the Forecasting of Energetic Effects While Wood Sawing
PublikacjaIn the classical approach, energetic effects (cutting forces and cutting power) of wood sawing process are generally calculated on the basis of the specifi c cutting resistance, which is in the case of wood cutting the function of more or less important factors. On the other hand, the cutting forces (power) problem may be tackled with an innovative, up-to-date fundamental analysis of the mechanics of sawing based on modern fracture mechanics....
-
Detection and Model of Thermal Traces Left after Aggressive Behavior of Laboratory Rodents
PublikacjaAutomation of complex social behavior analysis of experimental animals would allow for faster, more accurate and reliable research results in many biological, pharmacological, and medical fields. However, there are behaviors that are not only difficult to detect for the computer, but also for the human observer. Here, we present an analysis of the method for identifying aggressive behavior in thermal images by detecting traces...
-
Idea zrównoważonego rozwoju
PublikacjaZrównoważony rozwój to termin bardzo popularny, w ostatnich latach pojawiający się nie tylko w aktach prawnych, statutach i dokumentach strategicznych, lecz także w publikacjach naukowych czy wnioskach grantowych. Dla wielu osób mimo jasności koncepcji i rozumienia przekazu termin ten jest niejednoznaczny i pozwala na dowolną interpretację.