Filtry
wszystkich: 1547
wybranych: 1077
-
Katalog
- Publikacje 1077 wyników po odfiltrowaniu
- Czasopisma 1 wyników po odfiltrowaniu
- Konferencje 3 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 21 wyników po odfiltrowaniu
- Kursy Online 6 wyników po odfiltrowaniu
- Wydarzenia 4 wyników po odfiltrowaniu
- Dane Badawcze 434 wyników po odfiltrowaniu
Filtry wybranego katalogu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: ATTACK SCENARIO
-
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting
PublikacjaNDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...
-
Architektura pomników poświęconych ofiarom ataków terrorystycznych jako kontynuacja realizacji komemoratywnych kształtowanych w postpamięci
Publikacjaarchitecture of Memorials Dedicated to the Victims of terrorist attacks as a continuation of commemorative Structures created within Post-memory Having the rich art of commemorating events of the Second World War as a key reference, this article will try to show how contemporary architectural interven- tions in public space make attempts to respond to the social need of dealing with traumatic events and formulating a new attitude...
-
Government in the metaverse: Requirements and suitability for providing digital public services
PublikacjaDigital government comprises all means to enable governments to interact with their constituents digitally. The metaverse provides a virtual reality environment where various activities can be carried out without physically visiting the places of interest, including the public authorities. Yet, how governments can use the metaverse is unknown. This paper aims to extend the understanding of the metaverse architecture requirements...
-
An optimized system for sensor ontology meta-matching using swarm intelligent algorithm
PublikacjaIt is beneficial to annotate sensor data with distinct sensor ontologies in order to facilitate interoperability among different sensor systems. However, for this interoperability to be possible, comparable sensor ontologies are required since it is essential to make meaningful links between relevant sensor data. Swarm Intelligent Algorithms (SIAs), namely the Beetle Swarm Optimisation Algorithm (BSO), present a possible answer...
-
Service and Path Discovery Extensions for Self-forming IEEE 802.11s Wireless Mesh Systems
PublikacjaWith the rapid growth of the quantity and capabilities of end-user electronic devices, both stationary and mobile, they are employed in increasing number of applications. In this situation, wireless network technologies begin to play a crucial role as networks access technologies, as cable-based solutions tend to be of limited utility in case of easily portable or mobile devices. Resulting development of wireless technologies reached...
-
Energy Recovery Analysis in A-Type Pressure Regulation and Measurement Stations in Istanbul, Esenyurt
Publikacja -
Coastal Cliffs Monitoring and Prediction of Displacements Using Terrestial Laser Scanning
PublikacjaCoastal cliffs are very sensitive to degradation caused by erosion and abrasion. Thus, it is very important to monitor susceptibility of the cliffs in terms of slope angles and ground fall resulting from vertical morphology of the cliffs. The results could be used for example to establish the boundaries of the safe investments zone or retreat infrastructure buildings in case of real threat such as degradation of the objects of...
-
Diver Observations by Means of Acoustic Methods
PublikacjaSearching for objects, especially small ones, moving under water near its the free surface, is always not an easy task. Designing tools for the detection of such targets is a real challenge when the possibility of a terrorist attack is a real threat. This paper presents some aspects of diver detection by means of acoustics methods, both active (side scan sonar) and passive ones (linear receiving antenna). This approach is quite...
-
Analysis of impact of audio modifications on the robustness of watermark for non-blind architecture
PublikacjaThe aim of this paper is to assess the robustness of the non-blind audio content watermarking scheme proposed by the authors. The authors present the architecture of the designed system along with the employed workflows for embedding and extracting the watermark followed by the implementation phase description and the analysis of the experimental results. Some possible attack simulations on the embedded watermarks are reviewed,...
-
Flexible Knowledge–Vision–Integration Platform for Personal Protective Equipment Detection and Classification Using Hierarchical Convolutional Neural Networks and Active Leaning
PublikacjaThis work is part of an effort to develop of a Knowledge-Vision Integration Platform for Hazard Control (KVIP-HC) in industrial workplaces, adaptable to a wide range of industrial environments. The paper focuses on hazards resulted from the non-use of personal protective equipment (PPE). The objective is to test the capability of the platform to adapt to different industrial environments by simulating the process of randomly selecting...
-
Applying Web 2.0 Concepts to Creating Energy Planning Portal
PublikacjaCommunity authorities in Europe are tasked to create Advanced Local Energy Plans (ALEP), which encompasses collecting local data on current energy use and generation, as well as generating future development scenarios. Both the data and the development scenarios must be publicly accessible as a basis for energy-related decisions taken by residents, local companies and other local institutions. The data must partially be collected...
-
Bioterrorism — characteristics and possibilities of prevention
PublikacjaIn the paper bioterrorist threats have been presented. Historical background and possible methods of attacks have been described. The most dangerous pathogens and disease entities have been classified. Selected methods of detection and identification of biological weapon have been presented. The wireless system for threats monitoring — developed at Gdansk University of Technology — has been described.
-
Energy Efficiency Study of Audio-video Content Consumption on Selected Android Mobile Terminals
PublikacjaMobile devices are widely used by billions of users worldwide. Thanks to their main advantage, which is portability, they should be fully operational as long as possible, without the need to recharge or connect them to external power sources. This paper describes a study, carried out on four different mobile devices, with different hardware and software parameters, running the Android operating system. The research campaign involved...
-
Multi-Criteria Knowledge-Based Recommender System for Decision Support in Complex Business Processes
PublikacjaIn this paper, we present a concept of a multi-criteria knowledge-based Recommender System (RS) designed to provide decision support in complex business process (BP) scenarios. The developed approach is based on the knowledge aspects of Stylistic Patterns, Business Sentiment and Decision-Making Logic extracted from the BP unstructured texts. This knowledge serves as an input for a multi-criteria RS algorithm. The output is prediction...
-
An Empirical System Loss Model for Body Area Networks in a Passenger Ferry Environment
PublikacjaThis paper presents a general empirical system loss model for estimating propagation loss in Body Area Networks in off-body communications at 2.45 GHz in a passenger ferry environment. The model is based on measurements, which were carried out in dynamic scenarios in the discotheque passenger ferry environment. The model consists of three components: mean system loss, attenuation resulting from the variable antenna position on...
-
An Empirical System Loss Model for Body Area Networks in a Passenger Ferry Environment
PublikacjaThis paper presents a general empirical system loss model for estimating propagation loss in Body Area Networks in off-body communications at 2.45 GHz in a passenger ferry environment. The model is based on measurements, which were carried out in dynamic scenarios in the discotheque passenger ferry environment. The model consists of three components: mean system loss, attenuation resulting from the variable antenna position on...
-
Balancing Energy Inputs/Outputs and GHG Emissions for Sustainable Wastewater Treatment – a Case Study
PublikacjaThe aim of the study is a model-based evaluation of the selected operating modes and technological upgrades on the energy balance and greenhouse gas (GHG) emissions in a large wastewater treatment plant in the city of Slupsk (northern Poland). The considered scenarios focus on energy savings for aeration, increasing energy recovery via biogas cogeneration and reduction of the CO2 equivalent emission from both direct processes (related...
-
Disciplines and measures of information resilience
PublikacjaCommunication networks have become a fundamental part of many critical infrastructures, playing an important role in information delivery in various failure scenarios triggered e.g., by forces of nature (including earthquakes, tornados, fires, etc.), technology-related disasters (for instance due to power blackout), or malicious human activities. A number of recovery schemes have been defined in the context of network resilience...
-
Device for spoofing in global positioning system
PublikacjaThis article describes the device which may be used to generate false GPS signals and emit them into radio communication channel. Such attack is called GPS spoofing. Each GPS receiver which remains in the range of a spoofing device (called spoofer) indicates time and position coordinates which are predetermined by the spoofer’s operator. Spoofing may be used e.g. in order to disable the terrorist group from obtaining correct navigation...
-
Distributed representation of information on cyclic events
PublikacjaA representation of information on cyclic events has been proposed which is advantageous for computing environments where a distributed set of Receivers reacts to cyclic events generated by distributed sources. In such scenario no immanent central information repository exist on event timing or volume. Receivers are able to learn the event cycles without communicating with each other, merely on the basis of the fact that an event...
-
Mode choice modelling for urban areas
PublikacjaThe article presents the question of mode choice modelling in a four-stage travel modelling process. The article indicates limitations of currently used simplified methods of mode choice modelling and presents the possibility of using a more detailed approach that accounts for additional, statistically significant factors with the use of advanced mathematical tools, discrete choice models. A need has also been identified to include...
-
Incremental dynamic analysis and fragility assessment of buildings founded on different soil types experiencing structural pounding during earthquakes
PublikacjaThe effect of the soil type on buildings experiencing pounding during earthquakes is investigated in this study using the incremental dynamic analysis and fragility assessment methods. Three 3-D structures with different number of storeys (4, 6 and 8) were considered in this study. Three pounding scenarios between these three buildings were taken into account, i.e. pounding between 4-storey and 6-storey buildings, between 4-storey...
-
Bio-inspired Urban Design: Smart Growth and Sustainable Development Frameworks for a New Urban Unit in Cracow
PublikacjaIn March 2012, architects João Diniz (Brazil) and Dorota Wiśniewska (Poland) answered a call to competition from the City of Cracow, submitting an entry for the redesign of 5600 ha of the Nowa Huta district in eastern Cracow, focusing on economic revitalization within a framework of smart growth and sustainable development. The scenario included an ArcerolMittal Steelworks and incorporated a strong ecological analysis for the easternmost...
-
Mobility Oriented Development (MOD): Public-Private Partnership in Urban Parking & Traffic Management with the Use of Autonomous Automobiles, Car-Sharing, Ridesharing Modes of Transport & Mobility as a Service (MaaS)
PublikacjaThe focus of the following research are relations between mobility technologies and metropolitan (urban and suburban) spatial structures. In this paper the author discusses various urban modes of transport (automobile, mass transit) in the context of emerging technical (autonomous vehicles, self-driving cars and driverless shuttles) and organizational (carpooling, ridesharing, car-sharing, on-demand mobility) solutions for " mobility...
-
Applicability of null-steering for spoofing mitigation in civilian GPS
PublikacjaCivilian GPS signals are currently used in many critical applications, such as precise timing for power grids and telecommunication networks. Spoofing may cause their improper functioning. It is a threat which emerges with the growing availability of GPS constellation simulators and other devices which may be used to perform such attack. Development of the effective countermeasures, covering detection and mitigation, is necessary...
-
Multipartite secret key distillation and bound entanglement
PublikacjaRecently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable...
-
Previous Opinions is All You Need - Legal Information Retrieval System
PublikacjaWe present a system for retrieving the most relevant legal opinions to a given legal case or question. To this end, we checked several state-of-the-art neural language models. As a training and testing data, we use tens of thousands of legal cases as question-opinion pairs. Text data has been subjected to advanced pre-processing adapted to the specifics of the legal domain. We empirically chose the BERT-based HerBERT model to perform...
-
Experience Based Clinical Decision Support Systems: An Overview and Case Studies
PublikacjaThis chapter briefly overviews the evolution of the application of the Decisional DNA and the Set of Experience Knowledge Structure (SOEKS) in the medical domain and in particular in the specific case of the experience-based decision support systems. Decisional DNA, as a knowledge representation structure, offers great possibilities on gathering explicit knowledge of formal decision events as well as a tool for decision making...
-
Dynamic unattended measurement based routing algorithm for diffServ architecture
PublikacjaDynamic routing is very important in terms of assuring QoS in today's packet networks especially for streaming and elastic services. Existing solutions dedicated to dynamic routing are often too complicated and seem to be not usable in real time traffic scenarios where transferred traffic may vary significantly. This was the main reason for research and new routing mechanism proposal which should apply to today's packet networks....
-
Rendezvous of Heterogeneous Mobile Agents in Edge-Weighted Networks
PublikacjaWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
Rendezvous of heterogeneous mobile agents in edge-weighted networks
PublikacjaWe introduce a variant of the deterministic rendezvous problem for a pair of heterogeneous agents operating in an undirected graph, which differ in the time they require to traverse particular edges of the graph. Each agent knows the complete topology of the graph and the initial positions of both agents. The agent also knows its own traversal times for all of the edges of the graph, but is unaware of the corresponding traversal...
-
Receiver-side fingerprinting method for color images based on a series of quaternion rotations
PublikacjaThe proposed method is a new Joint Fingerprinting and Decryption (JFD) method that uses a cipher based on quaternion rotation to encrypt color images that are then sent to all users via multicast transmission. Individual encryption keys depend on the users’ fingerprints, so that a unique fingerprint is introduced into the image during decryption for each decryption key. A simulation-based research was conducted to examine the method’s...
-
PTR-MS and electronic nose application for volatile fraction analysis of cigar tobacco
PublikacjaCigar consumers attach great importance to the quality of these products. At the same time, cigars are often expensive, so destructive analytical methods of quality control are not being desired. However, it has been found that there are many volatile organic compounds in their headspace. Because of that, proton transfer reaction–mass spectrometry and electronic nose were used to analyse it. The obtained results were used to distinguish...
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublikacjaThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
Universal construction of genuinely entangled subspaces of any size
PublikacjaWe put forward a simple construction of genuinely entangled subspaces – subspaces supporting only genuinely multipartite entangled states – of any permissible dimensionality for any number of parties and local dimensions. The method uses nonorthogonal product bases, which are built from totally nonsingular matrices with a certain structure. We give an explicit basis for the constructed subspaces. An immediate consequence of our...
-
Experimental test of nonclassicality with arbitrarily low detection efficiency
PublikacjaWe theoretically introduce and experimentally demonstrate the realization of a nonclassicality test that allows for arbitrarily low detection efficiency without invoking an extra assumption of independence of the devices. Our test and its implementation is set in a prepare-and-measure scenario with an upper limit on the classical communication capacity of the channel through which the systems are communicated. The essence for our...
-
INVESTIGATION INTO INTERFEROMETRIC SONAR SYSTEM ACCURACY
PublikacjaThe results of the accuracy measurements of phase differencing bathymetric sonar (PDBS) system in shallow waters are presented in the article. The measurement results were compared with the theoretical calculations for sonar system accuracy and international standards for hydrographic surveys. The proposed formulas enable to assess a priori sonar system performance using system quality factor (SQF), which takes into account influence...
-
Sharp transitions in low-number quantum dots Bayesian magnetometry
PublikacjaWe consider Bayesian estimate of static magnetic field, characterized by a prior Gaussian probability distribution, in systems of a few electron quantum dot spins interacting with infinite temperature spin environment via hyperfine interaction. Sudden transitions among optimal states and measurements are observed. Usefulness of measuring occupation levels is shown for all times of the evolution, together with the role of entanglement...
-
Detection of illicit chemicals by portable Raman spectrometer
PublikacjaThe Raman spectrometers can be built as the portable devices and can be used in various places to detect illicit chemicals. This method has become popular due to deficiency of other fast methods that could be applied against terrorist attacks or could help police at their work. The conception of a portable Raman spectrometer has been presented. The description enclosures presentation of the prepared device and its possible applications...
-
Measurements of Path Loss in Off-Body Channels in Indoor Environments
PublikacjaThis paper presents a measurements of the path loss for validation of a statistical model for off-body radio channels in an indoor multipath environment, which considers the distance dependent mean path loss, and describes body shadowing and fast fading components in a statistical way. The measurement equipment and propagation indoor environment have been presented. Two different bodies and five static and two walking scenarios...
-
User Orientation Detection in Relation to Antenna Geometry in Ultra-Wideband Wireless Body Area Networks Using Deep Learning
PublikacjaIn this paper, the issue of detecting a user’s position in relation to the antenna geometry in ultra-wideband (UWB) off-body wireless body area network (WBAN) communication using deep learning methods is presented. To measure the impulse response of the channel, a measurement stand consisting of EVB1000 devices and DW1000 radio modules was developed and indoor static measurement scenarios were performed. It was proven that for...
-
Incremental Dynamic Analysis and Fragility Assessment of Buildings with Different Structural Arrangements Experiencing Earthquake-Induced Structural Pounding
PublikacjaStructural pounding is considered as one of the most critical phenomena occurring during earthquakes. This paper presents the incremental dynamic analysis and fragility assessment of buildings experiencing earthquake-induced pounding. Three 3-D buildings with different number of storeys and under different structural arrangements have been considered. Three pounding scenarios have been taken into account, i.e. pounding between...
-
Study on VR Application Efficiency of Selected Android OS Mobile Devices
PublikacjaCurrently, the number of scenarios for using VR (Virtual Reality) technology grows every year. Yet, there are still issues associated with it, related with the performance of the mobile device itself. The aim of this work is to perform an analysis of the effectiveness of virtual reality applications in case of mobile platforms. We put the main emphasis on examining the performance and efficiency of four different hardware and software...
-
Collision-Free Network Exploration
PublikacjaA set of mobile agents is placed at different nodes of a n-node network. The agents synchronously move along the network edges in a collision-free way, i.e., in no round may two agents occupy the same node. In each round, an agent may choose to stay at its currently occupied node or to move to one of its neighbors. An agent has no knowledge of the number and initial positions of other agents. We are looking for the shortest possible...
-
Flooding Extent Mapping for Synthetic Aperture Radar Time Series Using River Gauge Observations
PublikacjaThe flooding extent area in a river valley is related to river gauge observations such as discharge and water elevations. The higher the water elevations, or discharge, the larger the flooding area. Flooding extent maps are often derived from synthetic aperture radar (SAR) images using thresholding methods. The thresholding methods vary in complexity and number of required parameters. We proposed a simple thresholding method that...
-
Numerical modeling of PFAS movement through the vadose zone: Influence of plant water uptake and soil organic carbon distribution
PublikacjaIn this study, we investigated the effects of soil organic carbon (SOC) distribution and water uptake by plant roots on PFAS movement in the vadose zone with a deep groundwater table under temperate, humid climate conditions. Two series of numerical simulations were performed with the HYDRUS computer code, representing the leaching of historical PFOS contamination and the infiltration of water contaminated with PFOA, respectively. We...
-
Zero-knowledge convincing protocol on quantum bit is impossible
PublikacjaIt is one of fundamental features of quantum formalism that o n one hand it provides a new infor- mation processing resources and on the other hand puts funda mental constraints on the processing of quantum information implying “no-go” theorems for cloni ng [1–3], bit commitment [4, 5] and deleting [6] in quantum theory. Here we ask about possibilit y of “zero knowledge” scenario which, for its simplicity, can be considered as...
-
Receiver-side fingerprinting method based on quaternion sandwich product
PublikacjaIn this paper a new receiver-side fingerprinting method for color images is proposed. The proposed method belongs to the group of Joint Fingerprinting and Decryption (JFD) methods. Each component of the color image is represented as a point in 3D space, which is formed by 3 color channels. Encryption and fingerprinting can be interpreted as rotation, scaling and translation of these points. Calculations are performed using quaternion...
-
Impedance monitoring of fuel cell stacks
PublikacjaThis paper presents an innovative, electrochemical impedance method for monitoring of electrochemical behaviour of a multi-cell, direct methanol fuel cell (DMFC) device. This method not only provides classical voltage changes at successive cells but also allows their detailed impedance behaviour to be presented. Impedance characteristics of individual cells within a fuel cell stack (depending on actual operating conditions) are...
-
Framework for extracting rails and setting-out railway line axis based on UAV photogrammetric measurements
PublikacjaTechnical diagnostics enables assessing the current technical condition of a railway line and adjacent infrastructure, and forecasting its changes over a specific time horizon. One of its elements is the periodic monitoring of rail position and their geometry. This article presents a new framework for the setting-out of a railway track axis. The process presented in the manuscript is based on the specific filtration and extraction...