Filtry
wszystkich: 876
wybranych: 780
-
Katalog
- Publikacje 780 wyników po odfiltrowaniu
- Czasopisma 7 wyników po odfiltrowaniu
- Konferencje 2 wyników po odfiltrowaniu
- Osoby 15 wyników po odfiltrowaniu
- Projekty 1 wyników po odfiltrowaniu
- Kursy Online 17 wyników po odfiltrowaniu
- Wydarzenia 1 wyników po odfiltrowaniu
- Dane Badawcze 53 wyników po odfiltrowaniu
Filtry wybranego katalogu
Wyniki wyszukiwania dla: JAMMING ATTACKS
-
Distributed protection against non-cooperative node behavior in multi-hop wireless networks
PublikacjaAn important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...
-
Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining
PublikacjaThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via...
-
Security Information Sharing for the Polish Power System
PublikacjaThe Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...
-
RECODIS: Resilient Communication Services Protecting End-user Applications from Disaster-based Failures
PublikacjaDisaster-based failures can seriously disrupt any communication network, making its services unavailable. Such disruptions may be caused by natural disasters, technology-related failures, or malicious attacks, and they are observably increasing in number, intensity and scale. When network services that are a part of critical infrastructure become unavailable, commercial and/or societal problems are inevitable. The issue of limiting...
-
Service-based Resilience for Embedded IoT Networks
PublikacjaEmbedded IoT networks are the backbone of safety-critical systems like smart factories, autonomous vehicles, and airplanes. Therefore, resilience against failures and attacks should be a prior concern already in their design stage. In this study, we introduce a service-based network model as an MILP optimization problem for the efficient deployment of a service overlay to the embedded network by meeting QoS and resilience requirements....
-
Dynamical description of quantum computing: generic nonlocality of quantumnoise
PublikacjaWe develop a dynamical non-Markovian description of quantum computing in the weak-coupling limit, in the lowest-order approximation. We show that the long-range memory of the quantum reservoir (such as the 1/t4 one exhibited by electromagnetic vacuum) produces a strong interrelation between the structure of noise and the quantum algorithm, implying nonlocal attacks of noise. This shows that the implicit assumption of quantum error...
-
DYNWIR S-70 program for modal analysis of multisupported and multimass rotors
PublikacjaThe article provides a brief description of the program Dynwir-S-70 (currently being developed in the Rotor Dynamics and Slide Bearings Department in the Institute of Fluid-Flow Machinery Polish Academy of Sciences in Gdansk) which is a program for analysis of multi-supported and multi-mass rotors. Used algorithms and the construction of mass and stiffness matrix were presented. Damping matrix structure based on Rayleigh damping...
-
On the modelling of aerodynamic force coefficients for over-shroud seals of turbine stages
PublikacjaThis paper presents experimental investigations which made it possible to determine dynamic coefficients of labyrinth over-shroud seal of a model air turbine. The coefficients associate pressure forces with turbine rotor displacement, velocity and acceleration respective to turbine casing (linear model) and play important role in analyzing turbine-set dynamics. The obtained results indicated that involving serious errors can be...
-
Possible uses of crisis situation aiding system in virtual world simulation
PublikacjaMany of the real world crisis situations like spreading fire, hostile units attack, flood, and etc. are commonly used in computer games where a simulation of extensive virtual world is crucial. This paper presents some ideas for possible uses of existing crisis situation aiding system in such environments. Moreover, it shows how this kind of system can be taught during subsequent games with a large number of players. As an example...
-
Mesh dependence study for numerical assessment of hydrodynamic characteristics of windsurfing fin
PublikacjaThe presented research aims to assess the drag coefficient and lift coefficient versus angle of attack curves for windsurfing fin. Special attention in the research was being paid to the evaluation of the stall angle value. The angle of incidence for which the stall occurs was searched, and the sensitivity of the solution for the mesh resolution was studied. The mesh resolution sensitivity analysis was done by systematically decreasing...
-
The Novel Findings About the Hussite’s Warfares in the Gdansk/Danzig Surrounding in the Late Summer of 1433
PublikacjaOne of the most spectacular episodes during the Hussite Wars was the Czech raid through the lands of the Teutonic Order up to the Baltic Sea in 1433. Although historians and then-witnesses focused on the sacked Cistercian Abbey in Oliva and soldiers filling the bottles with seawater, the scale of damages in the main harbour of Prussia and its surroundings has not been the subject of research yet. Furthermore, most scholars treatthe...
-
Wybrane aspekty modelowania uderzenia pojazdem dźwigara wiaduktu
PublikacjaW pracy przedstawiono różne zagadnienia związane z uderzeniem pojazdu w dźwigar wiaduktu. Omówiono wybór modelu obliczeniowego, na podstawie porównania wyników dla modelu dźwigara zespolonego, modelu dźwigara stalowego oraz modelu wiaduktu. Następnie opisano model dźwigara zespolonego zastosowany w analizie MES oraz metodę wyznaczania współczynników tłumienia Rayleigha. Symulację numeryczną uderzenia dźwigara wiaduktu przez koparkę...
-
Some Security Features of Selected IoT Platforms
PublikacjaIoT (Internet of Things) is certainly one of the leading current and future trends for processing in the current distributed world. It is changing our life and society. IoT allows new ubiquitous applications and processing, but, on the other hand, it introduces potentially serious security threats. Nowadays researchers in IoT areas should, without a doubt, consider and focus on security aspects. This paper is aimed at a high-level...
-
Disaster-resilient communication networks: Principles and best practices
PublikacjaCommunication network failures that are caused by disasters, such as hurricanes, arthquakes and cyber-attacks, can have significant economic and societal impact. To address this problem, the research community has been investigating approaches to network resilience for several years. However, aside from well-established techniques, many of these solutions have not found their way into operational...
-
Threat intelligence platform for the energy sector
PublikacjaIn recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...
-
Elastic waves in the railroad track substructures and its surroundings analyzed with non-classical operational methods
PublikacjaWe analyze the propagation of the waves generated by the rolling stock and the interaction of those waves on the medium and its surroundings. We use non-classical operational methods for monitoring construction of the railway infrastructure and for noise damping.
-
Environmental Impacts of Renewable Energy Technologies
PublikacjaNowadays, fossil fuels are the main sources energy from which electricity is obtained. But these sources will not last forever, so in due course renewable energies will have to replace them in this role. All energy sources have some impact on our environment. Fossil fuels — coal, oil, and natural gas — do substantially more harm than renewable energy sources by most measures, including air and water pollution, damage to public...
-
On description of periodic magnetosonic perturbations in a quasi-isentropic plasma with mechanical and thermal losses and electrical resistivity
PublikacjaMagnetosonic periodic perturbations in a uniform and infinite plasma model are considered. Damping due to compressional viscosity, electrical resistivity, and thermal conduction are taken into account, as well as some heating–cooling function, which may destroy the isentropicity of wave perturbations. The wave vector forms arbitrary angle h with the equilibrium straight magnetic field, and all perturbations are functions...
-
EXPERIMENTS AND SIMULATIONS FOR LAPAROSCOPICVENTRAL HERNIA REPAIR IMPROVEMENT
PublikacjaThe authors conducted a wide experimental and numerical study in order to determine effective approaches in the laparoscopic VH repair. At first the study covered identification of mechanical properties of the abdominal fascia, implants, tacks and transabdominalsutures. Basis on these data, the one and two-dimensional mathematical models were formulated and a number of numerical static and dynamic analyses were carried out. Then...
-
Production, Transformation and Determination of Volatile Fatty Acids in Farm Animals and the Environment
PublikacjaThe paper is a critical discussion of the production, transportation and determination of volatile fatty acids in rumens of ruminants. The odor nuisance of the emission of VFAs, often accompanied by volatile nitrogen- and sulfur-organic compounds from animal farming is also discussed.
-
Influence of windsurfing fin stiffness distribution on the lift-drag characteristics
PublikacjaThis article addresses the problem of determining the hydromechanical loads generated by flexible hydrofoils. The research was done on the example of the composite windsurfing fin for the RS:X monotype class. Despite the assumption of fins identity, everyday practice showed that variations of mechanical properties occur and strongly affect their performance. Therefore, we decided to study the differences between the windsurfing...
-
Effect of soil on the capacity of viscous dampers between adjacent buildings
PublikacjaThis study investigated the seismic pounding of two adjacent buildings considering soil–structure interaction (SSI). A comprehensive parametric study of buildings with different heights was performed to reveal the pounding-involved behaviour considering the soil effect. Wavelet transform has been conducted to gain insight into the differences in the frequency contents of the impact forces between fixed- and flexible-base adjacent...
-
Identyfikacja parametrów dynamicznych want mostu Rędzińskiego we Wrocławiu
Publikacjathe paper presents results of dynamic analysis conducted on stay-cables of rędziński bridge in wrocław. identified in situ dynamic parameters (natural frequency and logarithmic decrement damping ratio) of selected stays were and compared to the values featured in the project.
-
Photosensitization of TiO2 and SnO2 by Artificial Self-Assembling Mimics of the Natural Chlorosomal Bacteriochlorophylls
PublikacjaOf all known photosynthetic organisms, the green sulfur bacteria are able to survive under the lowest illumination conditions due to highly efficient photon management and exciton transport enabled by their special organelles, the chlorosomes, which consist mainly of self-assembled bacteriochlorophyll c, d, or e molecules. A challenging task is to mimic the principle of self-assembling chromophores in artificial light-harvesting...
-
Information Retrieval with the Use of Music Clustering by Directions Algorithm
PublikacjaThis paper introduces the Music Clustering by Directions (MCBD) algorithm. The algorithm is designed to support users of query by humming systems in formulating queries. This kind of systems makes it possible to retrieve songs and tunes on the basis of a melody recorded by the user. The Music Clustering by Directions algorithm is a kind of an interactive query expansion method. On the basis of query, the algorithm provides suggestions...
-
Diver Observations by Means of Acoustic Methods
PublikacjaSearching for objects, especially small ones, moving under water near its the free surface, is always not an easy task. Designing tools for the detection of such targets is a real challenge when the possibility of a terrorist attack is a real threat. This paper presents some aspects of diver detection by means of acoustics methods, both active (side scan sonar) and passive ones (linear receiving antenna). This approach is quite...
-
Coastal Cliffs Monitoring and Prediction of Displacements Using Terrestial Laser Scanning
PublikacjaCoastal cliffs are very sensitive to degradation caused by erosion and abrasion. Thus, it is very important to monitor susceptibility of the cliffs in terms of slope angles and ground fall resulting from vertical morphology of the cliffs. The results could be used for example to establish the boundaries of the safe investments zone or retreat infrastructure buildings in case of real threat such as degradation of the objects of...
-
Analysis of impact of audio modifications on the robustness of watermark for non-blind architecture
PublikacjaThe aim of this paper is to assess the robustness of the non-blind audio content watermarking scheme proposed by the authors. The authors present the architecture of the designed system along with the employed workflows for embedding and extracting the watermark followed by the implementation phase description and the analysis of the experimental results. Some possible attack simulations on the embedded watermarks are reviewed,...
-
Service-based Resilience via Shared Protection in Mission-critical Embedded Networks
PublikacjaMission-critical networks, which for example can be found in autonomous cars and avionics, are complex systems with a multitude of interconnected embedded nodes and various service demands. Their resilience against failures and attacks is a crucial property and has to be already considered in their design phase. In this paper, we introduce a novel approach for optimal joint service allocation and routing, leveraging virtualized...
-
Quality Modeling in Grid and Volunteer-Computing Systems
PublikacjaA model of computational quality in large-scale computing systems was presented in the previous chapter of this book. This model describes three quality attributes: performance, reliability and energy efficiency. We assumed that all processes in the system are incessantly ready to perform calculations and that communication between the processes occurs immediately. These assumptions are not true for grid and volunteer computing...
-
Cops, a fast robber and defensive domination on interval graphs
PublikacjaThe game of Cops and ∞-fast Robber is played by two players, one controlling c cops, the other one robber. The players alternate in turns: all the cops move at once to distance at most one each, the robber moves along any cop-free path. Cops win by sharing a vertex with the robber, the robber by avoiding capture indefinitely. The game was proposed with bounded robber speed by Fomin et al. in “Pursuing a fast robber on a graph”,...
-
Applicability of null-steering for spoofing mitigation in civilian GPS
PublikacjaCivilian GPS signals are currently used in many critical applications, such as precise timing for power grids and telecommunication networks. Spoofing may cause their improper functioning. It is a threat which emerges with the growing availability of GPS constellation simulators and other devices which may be used to perform such attack. Development of the effective countermeasures, covering detection and mitigation, is necessary...
-
MnCo2O4 deposited by spray pyrolysis as a protective layer for stainless steel interconects
PublikacjaStainless steel interconnects working in Solid Oxide Fuel Cells stacks are exposed to high temperature resulting in their corrosion. Protective layers for the hydrogen and oxygen sides are necessary to protect the interconnect material, prolongate the stack lifetime and maintain the output power. In this paper MnCo2O4 protective layer for the oxygen side of the interconnect is deposited by spray pyrolysis and is examined.
-
Health-Promoting Effects of Ethylene-Treated Kiwifruit ‘Hayward’ from Conventional and Organic Crops in Rats Fed an Atherogenic Diet
PublikacjaKiwifruit is a subtropical fruit that is very popular among consumers. Kiwifruit ‘Hayward’ (Actinidia deliciosa C.F. Liang et A.R. Ferguson) is an important source of bioactive compounds and possesses high antioxidant capacity, but its value can be changed during ripening. The aim of this study was to compare the levels of total polyphenols (TP), ascorbic acid (AA), and total antioxidant capacities (TACs) of ethylene-treated and...
-
About definition of modes and magnetosonic heating in a plasma’s flow: Especial cases of perpendicular and nearly perpendicular wave vector and magnetic field
PublikacjaDynamics of hydrodynamic perturbations in a plasma depend strongly on an angle between the wave vector and equilibrium straight magnetic field. The case of perpendicular propagation is especial. There are only two (fast) magnetosonic modes since two (slow) ones degenerate into the stationary one with zero speed of propagation. This demands individual definition of wave modes by the links of hydrodynamic relations. These links are...
-
Unusual dynamics and nonlinear thermal self-focusing of initially focused magnetoacoustic beams in a plasma
PublikacjaUnusual thermal self-focusing of two-dimensional beams in plasma which axis is parallel to the equilibrium straight magnetic field is considered. The equi- librium parameters of plasma determine scenario of a beam divergence (usual or unusual) which is stronger as compared with a flow without magnetic field. Nonlinear thermal self-action of a magnetosonic beam behaves differently in the ordinary and unusual cases. Damping of wave...
-
How to fund an additional secular function in the monumental church?
PublikacjaThe implementation of a new public function into the non-used church spaces like attics or cellars in context of revitalizing a lawfully protected historical city areas have diversified aspects. The article describes the financial aspect of adaptation of omitted spaces of monumental sacral buildings by presenting funding possibilities in the European Union countries available in period of 2017-2018 and the funds planned for the...
-
Accuracy of Differential Phase Delay Estimation for GPS Spoofing Detection
PublikacjaGPS spoofing is an attack based on transmission of false signals to target receivers, in order to force the computation of incorrect time, position or velocity information. It is a threat which is recently considered with continuously growing awareness. There is a need for effective way of GPS spoofing detection. Many groups of methods are proposed in the literature. Spatial processing methods are considered to be robust in a wide...
-
Comparative analysis of spectral and cepstral feature extraction techniques for phoneme modelling
PublikacjaPhoneme parameter extraction framework based on spectral and cepstral parameters is proposed. Using this framework, the phoneme signal is divided into frames and Hamming window is used. The performances are evaluated for recognition of Lithuanian vowel and semivowel phonemes. Different feature sets without noise as well as at different level of noise are considered. Two classical machine learning methods (Naive Bayes and Support...
-
Dynamics of mechanical model of implant-tissue system in ventral hernia repair
PublikacjaThe paper deals with a finite element modelling of implants in the problem of ventral hernia repair. The synthetic mesh implanted in the abdomen during surgery is here modelled as a membrane structure. Thesystem undergoes the internal abdominal pressure that occurs during the postoperative cough, the load identified in the literature as the main cause of the connection failure and hernia recurrence. The model can be used to estimate...
-
Approach to security assessment of critical infrastructures' information systems
PublikacjaThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
High temperature corrosion of evaporator tubes with thermal sprayed coatings
PublikacjaDegradation examinations of outer surface of low-emission steam boiler evaporator tubes are presented in the paper. Metallographic evaluation of scale morphology, its micro sites chemical composition analysis and distribution of elements on cross sections have been performed. Water-wall tubes were exposed in steam boiler for up to two years period. Common tubes made of 16Mo3 steel suffered sulphide and molten salts corrosions....
-
Macromolecular Templates for Synthesis of Inorganic Nanoparticles
Publikacja -
Educational and cognitive aspects of adaptation of nonuse spaces in monumental sacral objects.
PublikacjaThe area of attics and towers in historic churches in Europe are yet quite inaccessible places for visitors, shrouded in the atmosphere of mysticism, hiding many secrets. Introduction of the new public function into the non-used zones of the monumental sacral objects has many aspects including educational and cognitive ones which are discussed in the following article. The article indicates items that can be found in the zone above...
-
Multifunctional PID Neuro-Controller for Synchronous Generator
PublikacjaThis paper deals with a PID Neuro-Controller (PIDNC) for synchronous generator system. The controller is based on artificial neural network and adaptive control strategy. It ensures two functions: maintaining the generator voltage at its desired value and damping electromechanical oscillations. The performance of the proposed controller is evaluated on the basis of simulation tests. A comparative study of the results obtained with...
-
PTR-MS and electronic nose application for volatile fraction analysis of cigar tobacco
PublikacjaCigar consumers attach great importance to the quality of these products. At the same time, cigars are often expensive, so destructive analytical methods of quality control are not being desired. However, it has been found that there are many volatile organic compounds in their headspace. Because of that, proton transfer reaction–mass spectrometry and electronic nose were used to analyse it. The obtained results were used to distinguish...
-
Damage Detection Strategies in Structural Health Monitoring of Overhead Power Transmission System
PublikacjaOverhead power transmission lines, their supporting towers, insulators and other elements create a highly distributed system that is vulnerable to damage. Typical damage scenarios cover cracking of foundation, breakage of insulators, loosening of rivets, as well as cracking and breakage of lines. Such scenarios may result from various factors: groundings, lightning strikes, floods, earthquakes, aeolian vibrations, conductors galloping,...
-
Security of Cryptocurrencies: A View on the State-of-the-Art Research and Current Developments
Publikacja[Context] The goal of security is to protect digital assets, devices, and services from being disrupted, exploited or stolen by unauthorized users. It is also about having reliable information available at the right time. [Motivation] Since the inception in 2009 of the first cryptocurrency, few studies have been undertaken to analyze and review the state-of-the-art research and current developments with respect to the security...
-
Experimental study on the effectiveness of polymer damper in damage reduction of temporary steel grandstand
PublikacjaA large number of accidents, involving collapses of temporary grandstands during different types of events, were observed in the past. If the synchronized movement of people is tuned with the natural frequency of the affected part of the structure, resonance might occur. It may lead to severe damages of grandstands, their collapse or panic among the spectators. The aim of the paper is to assess, through preliminary experimental...
-
Testing a Variety of Features for Music Mood Recognition. Testowanie zestawu parametrów w celu rozpoznawania nastroju w muzyce
PublikacjaMusic collections are organized in a very different way depending on a target, number of songs or a distribution method, etc. One of the high-level feature, which can be useful and intuitive for listeners, is “mood”. Even if it seems to be the easiest way to describe music for people who are non-experts, it is very difficult to find the exact correlation between physical features and perceived impressions. The paper presents experiments...