Filtry
wszystkich: 6786
wybranych: 5265
-
Katalog
- Publikacje 5265 wyników po odfiltrowaniu
- Czasopisma 187 wyników po odfiltrowaniu
- Konferencje 142 wyników po odfiltrowaniu
- Osoby 140 wyników po odfiltrowaniu
- Projekty 6 wyników po odfiltrowaniu
- Kursy Online 99 wyników po odfiltrowaniu
- Wydarzenia 7 wyników po odfiltrowaniu
- Dane Badawcze 940 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: THREAT INTELLIGENCE
-
Low Cost Hexacopter Autonomous Platform for Testing and Developing Photogrammetry Technologies and Intelligent Navigation Systems
PublikacjaLow-cost solutions for autonomous aerial platforms are being intensively developed and used within geodetic community. Unmanned aerial vehicles are becoming very popular and widely used for photogrammetry and remote sensing applications. Today’s market offers an affordable price components for unmanned solution with significant quality and accuracy growth. Every year market offers a new solutions for autonomous platforms with better...
-
Designing optimal operational-point trajectories using an intelligent sub-strategy agent-based approach
PublikacjaW rozdziale opisuje się metodę projektowania optymalnej i bezpiecznego sterowania nieliniowymi procesami dynamicznymi. Poszukiwane sterowanie jest wynikiem zastosowania elementarnej strategii poszczególnych agentów, realizujšcych zadanie minimalizacji wspólnej miary kosztu sterowania. Zagadnienie projektowania optymalnego sterowania traktowane jest jako proces decyzyjny, w którym decyzje podejmowane sš w kolejnych regionach przestrzeni...
-
Designing optimal operational-point trajectories using an intelligent sub-strategy agent-based approach
PublikacjaW rozdziale opisuje się metodę projektowania optymalnej i bezpiecznego sterowania nieliniowymi procesami dynamicznymi. Poszukiwane sterowanie jest wynikiem zastosowania elementarnej strategii poszczególnych agentów, realizujących zadanie minimalizacji wspólnej miary kosztu sterowania. Zagadnienie projektowania optymalnego sterowania traktowane jest jako proces decyzyjny, w którym decyzje podejmowane są w kolejnych regionach przestrzeni...
-
Deep learning in the fog
PublikacjaIn the era of a ubiquitous Internet of Things and fast artificial intelligence advance, especially thanks to deep learning networks and hardware acceleration, we face rapid growth of highly decentralized and intelligent solutions that offer functionality of data processing closer to the end user. Internet of Things usually produces a huge amount of data that to be effectively analyzed, especially with neural networks, demands high...
-
Development of a new generation of unmanned surface and underwater vehicles using the advanced technologies and achievements towards the application of control systems by the artificial intelligence AI.
PublikacjaThe operation of offshore structures at sea requires implementation of the advanced systems of permanent monitoring of work of such the installations. Novel solutions concerning such the systems should be associated with application of unmanned maritime surface and underwater platforms. The unmanned maritime platforms are and will be based on application of the newest achievements of some important technologies. Between these technologies...
-
Road Transport of High Consequence Dangerous Goods—Assessment of Terrorist Threat (Case Study)
Publikacja -
Potential threat to Polish lakes and reservoirs from contamination by objects of environmental flood risk
Publikacja -
Automatic Threat Detection for Historic Buildings in Dark Places Based on the Modified OptD Method
PublikacjaHistoric buildings, due to their architectural, cultural, and historical value, are the subject of preservation and conservatory works. Such operations are preceded by an inventory of the object. One of the tools that can be applied for such purposes is Light Detection and Ranging (LiDAR). This technology provides information about the position, reflection, and intensity values of individual points; thus, it allows for the creation...
-
Creating dynamic maps of noise threat using pl-grid infrastructure; materiały konferencyjne
PublikacjaThis paper presents functionality and operation results of the system for creating dynamic maps of noise thread with the use of the PL-Grid infrastructure integrated with distributed sensors network for measuring, modeling and rendering noise level distribution. The work presented provides a demonstration of the services being prepared within the PLGrid Plus project. Specific computational environments, so called domain grids,...
-
Investigation of Noise Threats and Their Impact on Hearing in Selected Schools
PublikacjaNoise measurements conducted in selected schools in Gdansk area are presented in this paper. The main aim of this research was to determine noise threats at schools. Some objective measurements of the acoustic climate were performed employing a noise monitoring station engineered at the Multimedia System Department, Gdansk University of Technology. Simultaneously, subjective noise annoyance examinations were carried out among pupils...
-
Early detection of imminent threats in social relation graphs
PublikacjaWczesne wykrywanie zagrożeń i anomalii w sieciach społecznych jest dziś prawdziwym wyzwaniem. Ludzie w realnym świecie tworzą wiele złożonych relacji społecznych, które mogą być przedstawione za pomocą grafów, w których węzły reprezentują aktorów (pojedyncze osoby lub organizacje) a krawędzie wskazują na powiązania pomiędzy nimi. Analiza nieustannie zmieniających się relacji pomiędzy aktorami może wskazać konkretne nadciągające...
-
Emotions Embodied in the SVC of an Autonomous Driver System
PublikacjaA concept of embodied intelligence (EI) is considered. None of such implementations can be fully identified with artificial intelligence. Projects that dare to approach AI and EI should be based on both the AI concepts (symbolic and sub-symbolic), in solving real problems of perception and decision-making. Therefore, the EI, in this paper, is understood as a methodology that uses all available resources and algorithms from the...
-
Health threat associated with Caucasian giant hogweeds: awareness among doctors and general public in Poland
Publikacja -
Teaching Architecture – contemporary challenges and threats in the complexity of built environment
PublikacjaThe complexity of the modern built environment is a problem n ot only of architectural and urban issues. This issue extends to many othe r disciplines as well as covering a wide range of social engagements. The idea of writing this pa per is generally initiated by the debate which took place in Gdańs k on 22.01.2016, and was prepar ed in order to meet representatives of the four circles of interest...
-
Carsharing - Opportunities and Threats for Cities: Proposals of Solutions for Urban Policy
PublikacjaThe carsharing of a current generation is a short-term car renting service with a capability to find in the nearest surrounding a fleet car parked anywhere in the public space where the previous user left it, as well as to book, open, rent and pay of, with the use of a dedicated mobile application. Nowadays, only a minority of municipalities is considering implementing the carsharing in their policies. The lack of awareness of...
-
A video monitoring system using ontology-driven identification of threats
PublikacjaIn this paper, we present a video monitoring systemthat leverages image recognition and ontological reasoningabout threats. In the solution, an image processing subsystemuses video recording of a monitored area and recognizesknown concepts in scenes. Then, a reasoning subsystem uses anontological description of security conditions and informationfrom image recognition to check if a violation of a conditionhas occurred. If a threat...
-
Imminent threats analysis and security level evaluation in social networks
PublikacjaRozprawa doktorska poświęcona jest analizie nadciągających zagrożeń w sieciach społecznych. Dotyczy to takich zjawisk jak spam, phishing, kradzież tożsamości czy ataki na systemy reputacji w serwisach aukcji internetowych. W pracy zaproponowano metodę pozwalającą na wczesne wykrycie zagrożeń w sieciach społecznych w oparciu o zdefiniowane modele zachowań aktorów sieci. Modele zachowań tworzone są za pomocą podgrafów wzorcowych...
-
Ad hoc routing protocols - security objectives, threats and solution
PublikacjaZaprezentowano przykładowe strategie routingu stosowane w bezprzewodowych sieciach ad-hoc z transmisją wieloetapową. Dokonanao przegladu protokołow routingu, zidentyfikowano podstawowe typy ataków i zagrożenia integralności i poufności transmisji w sieciach bezprzewodowych. Przedstawiono przykładowe rozwiazania algorytmów routingu.
-
A new methodological approach to the noise threat evaluation based on the selected physiological properties of the human hearing system
PublikacjaA new way of assessment of noise-induced harmful effects on human hearing system is presented in the paper. The method takes into consideration properties of the selected physiological human hearing system. On the basis of the hearing examinations and noise measurements results and psychoacoustical noise dosimeter performance the new indicators of the noise harmfulness were proposed. The evaluation of the proposed indicators were...
-
Importance of artificial intelligence to support the process of anaerobicdigestion of kitchen waste with bioplastics / Znaczenie sztucznej inteligencji we wspomaganiu procesu beztlenowej fermentacji odpadów kuchennych zawierających bioplastiki
PublikacjaArtificial intelligence (AI) and machine learning were used to obtain more effective methods for conducting the digestion process and achieving final products. Data acquisition was carried out by an automatic monitoring and anal. research. The knowledge describing the anaerobic digestion process was summarized in the form of rules: IF (premise) THEN (conclusion). The compiled set of rules created a knowledge base of the expert...
-
THREE-DIMENSIONAL numerical investigation of MHD nanofluid convective heat transfer inside a CUBIC porous container with corrugated bottom wall
PublikacjaSimultaneous use of porous media and nanofluid as a heat transfer improvement method has recently captivated a great deal of attention. The heat transfer and entropy production of the Cu-water nanofluid inside a cubic container with a heated bottom wavy wall and an elliptic inner cylinder were numerically analyzed in this study. The container is partitioned into two sections: the left side is filled with permeable media and...
-
THREE-DIMENSIONAL NUMERICAL INVESTIGATION OF MHD NANOFLUID CONVECTIVE HEAT TRANSFER INSIDE A CUBIC POROUS CONTAINER WITH CORRUGATED BOTTOM WALL
Publikacja -
Signal Receiving and Processing Platform of the Experimental Passive Radar for Intelligent Surveillance System Using Software Defined Radio Approach
Publikacja -
Intelligent and active furcellaran-gelatin films containing green or pu-erh tea extracts: Characterization, antioxidant and antimicrobial potential
Publikacja -
Investigation of noise threats and their impact on hearing in selected schools - a pilot study.
PublikacjaNoise measurements conducted in selected schools in Gdansk area are presented in this paper. The main aim of this research was to determine noise threats at schools. Some objective measurements of the acoustic climate were performed employing a noise monitoring station engineered at the Multimedia System Department, Gdansk University of Technology. Simultaneously, subjective noise annoyance examinations were carried out among pupils...
-
Zagrożenia starych budynków w sąsiedztwie nowej zabudowy = The threat of old buildings security in neighbourhood of new buildings
PublikacjaNa przykładzie jednego z budynków mieszkalnych, przedstawiono zagrożenia na jakie są narażone stare obiekty w zwartej zabudowie śródmiejskiej, podczas prowadzenia w ich sąsiedztwie prac budowlanych, którym często towarzyszą głębokie wykopy. Powoduje to powstawanie licznych uszkodzeń, uniemozliwiających ich prawidłową eksploatację lub stanowiących nawet zagrożenie bezpieczeństwa.
-
Hybridized PWM Strategy for Three- and Multiphase Three-Level NPC Inverters
PublikacjaA simple hybridized pulsewidth modulation (PWM) algorithm for three- and multiphase three-level neutral point clamped (NPC) inverters is proposed. The proposed solution is based on classical space vector PWM (SVPWM) algorithms for two-level inverters but can also be based on sinusoidal PWM with min–max injection. An additional level of output voltage is obtained by modifying the resulting switching patterns taking into account...
-
Tribologia biołożysk i inteligentnych bioreaktorów problemem grantu europejskiego = Tribology of biobearings and intelligent bioreactors as the main problem of euro-project
PublikacjaPraca przedstawia kluczowe problemy związane z organizacją współpracy z uczelniami niemieckimi i badaniami naukowym przeprowadzanymi w zakresie biomechaniki i biotribologii w ramach grantu europejskiego MTK-CT-2004/2008-517226, którego koordynatorem na Wydziale Oceanotechniki i Okrętownictwa Politechnice Gdańskiej jest prof. Krzysztof Wierzcholski
-
HYDRODYNAMIC THRUST BEARINGS WITH POLYMER LINING
PublikacjaPolymeric linings of sliding surfaces of the hydrodynamic bearings have been used successfully for over 50 years. Despite of their long history of operation and research, they have not become wide spread in industrial applications. This fact may be surprising, considering th e conclusions that have been published concerning bearing operation and design. This paper summarizes the current...
-
Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs
PublikacjaIn ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...
-
Threats to Armenia’s Security in the National Strategy and Practice with Special Emphasis on External Security,
PublikacjaThe national security strategy adopted in 2007 provided a detailed definition of security and identified its threats. The key threat to the Armenian state was considered to be the Nagorno-Karabakh conflict. The document indicated the Collective Security Treaty Organisation main guarantor of security, with Russia being Armenia’s main partner in bilateral relations. The second position in the strategy was assigned to cooperation...
-
Operational analysis of threats to the security of NATO’s eastern flank. Context of hybrid activities
Publikacja -
Transport of dangerous goods by rail, and threats to the subsoil of the railway surface in the event of a disaster
PublikacjaIn Poland, in 2020, the mass of dangerous goods (loads) transported by rail was 26 151.06 thousand tone. This translated into the performance of 8 899 691.89 thousand tone - km of transport performance. In 2020, these figures accounted for 11.72% of the weight of goods transported by rail. The situation is similar in other countries around the world. With such a large volume of transport of dangerous...
-
Gender belief systems through the lens of culture—Differences in precarious manhood beliefs and reactions to masculinity threat in Poland and Norway.
Publikacja -
High-efficiency hybrid PV-TEG system with intelligent control to harvest maximum energy under various non-static operating conditions
Publikacja -
Determinants of anxiety levels among young males in a threat of experiencing military conflict–Applying a machine-learning algorithm in a psychosociological study
Publikacja -
Is the presence of Central European strains of Raphidiopsis (Cylindrospermopsis) raciborskii a threat to a freshwater fish? An in vitro toxicological study in common carp cells
Publikacja -
Monitoring of Selected CBRN Threats in the Air in Industrial Areas with the Use of Unmanned Aerial Vehicles
Publikacja -
Vaccination Against Measles, Mumps, and Rubella in the Light of Current Epidemic Threats: Unjustified Postponement
Publikacja -
AEGIS – Mobile Device for Generating Electromagnetic Curtain for Special Applications and Countering the Threats of RCIED
PublikacjaIn the article the assumptions, design and realization of the technological demonstrator of a mobile device for generating an electromagnetic curtain (with a cryptonym AEGIS) were presented, both in the area of hardware and software. The device is designed to block the radio communication systems by which it is possible to detonate the Radio Controlled Improvised Explosive Devices (RCIEDs). The preliminary laboratory tests of the...
-
Innovative consciousness and threats estimation connected with implementation of innovations to SMEs cooperating with shipbuilding industry
PublikacjaPodejmowanie działań innowacyjnych przez małe i średnie przedsiębiorstwa nie jest szeroko rozpowszechnione. Wynika to, między innymi, ze specyfiki tego sektora. MSP często dysponują ograniczonymi środkami finansowymi i nisko wykwalifikowanymi pracownikami, co stanowi w wielu przypadkach barierę we wprowadzaniu innowacji. Nie mniej istotne są inne podmioty działające w otoczeniu MSP włączające się w realizacje procesu innowacyjnego....
-
New Perspectives for the Use of Potentilla alba Rhizomes to Treat Thyroid Gland Impairments
Publikacja -
Temperature measurements in monitoring of large thrust bearings
PublikacjaW pracy przedstwiono krytyczną analizę aktualnych metod diagnostyki dużych hydrodnamicznych łożysk wzdłużnych hydrozespołów elektrowni wodnych. Wykazano niedostatki i zagrożenia płynące ze stosowania diagnostyki opartej na jednopunktowym pomiarze temperatury. Zaprezentowano wstępna koncepcję nowej metody diagnostycznej opartej na odwrotnym zagadnieniu przepływu ciepła (IPHC).
-
Large Hydrodynamic Thrust Bearings and Their Application in Hydrogenerators
PublikacjaLarge hydrodynamic thrust bearings are the bearings which, due to hydrodynamic lubrication, allow large axial load to be transferred from a moving part (shaft) to the stationary part via a thin layer of the lubricant (usually oil), thus providing extremely low friction and practically no wear. Hydrogenerators with vertical shafts are the most important application of large thrust bearings. Main design and scientific problems of...
-
HYDROSTATIC THRUST BEARING WITH REDUCED POWER LOSSES
PublikacjaIn many cases in rotating machinery, axial load is carried by tilting pad thrust bearings which have been developed since the beginning of 20th century. For high reliability and simplicity, most commonly the bearings are bath lubricated. In the times of sustainable development, however, minimization of friction losses becomes an important criterion for machinery assessment, and a strategic goal of their development. Performed calculations,...
-
Temperature measurements in monitoring of large thrust bearings
PublikacjaW pracy przedstwiono krytyczną analizę aktualnych metod diagnostyki dużych hydrodnamicznych łożysk wzdłużnych hydrozespołów elektrowni wodnych. Wykazano niedostatki i zagrożenia płynące ze stosowania diagnostyki opartej na jednopunktowym pomiarze temperatury. Zaprezentowano wstępna koncepcję nowej metody diagnostycznej opartej na odwrotnym zagadnieniu przepływu ciepła.
-
Temperature Measurements in Monitoring of Large Thrust Bearings
PublikacjaW pracy przedstawiono krytyczną ocenę popularnego systemu diagnostyki dużych łożysk wzdłużnych (np. łożysk nośnych hydrogeneratorów), w którym stosowany jest jednopunktowy pomiar temperatury w klockach łożyskowych. Stwierdzono, że taki układ pomiarowy nie pozwala na bezpieczną eksploatację łożysk, ponieważ posiada bardzo duże opóźnienie czasowe, nie daje informacji o lokalnych zagrożeniach, nie pozwala racjonalnie ustalić poziomów...
-
Three-fast-searchable graphs
PublikacjaIn the edge searching problem, searchers move from vertex to vertex in a graph to capture an invisible, fast intruder that may occupy either vertices or edges. Fast searching is a monotonic internal model in which, at every move, a new edge of the graph G must be guaranteed to be free of the intruder. That is, once all searchers are placed the graph G is cleared in exactly |E(G)| moves. Such a restriction obviously necessitates...
-
AUTOMATED NEGOTIATIONS OVER COLLABORATION PROTOCOL AGREEMENTS
PublikacjaThe dissertation focuses on the augmentation of proactive document - agents with built-in intelligence to recognize execution context provided by devices visited during a business process, and to reach collaboration agreement despite conflicting requirements. The proposed solution, based on intelligent bargaining using neural networks to improve simple multi-issue negotiation between the document and thedevice, requires practically...
-
Design of three-phase three-level CIC T-source inverter with maximum boost control
Publikacja