Filtry
wszystkich: 1255
wybranych: 889
-
Katalog
- Publikacje 889 wyników po odfiltrowaniu
- Czasopisma 119 wyników po odfiltrowaniu
- Konferencje 81 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 51 wyników po odfiltrowaniu
- Wynalazki 5 wyników po odfiltrowaniu
- Projekty 11 wyników po odfiltrowaniu
- Kursy Online 34 wyników po odfiltrowaniu
- Wydarzenia 1 wyników po odfiltrowaniu
- Dane Badawcze 63 wyników po odfiltrowaniu
Filtry wybranego katalogu
Wyniki wyszukiwania dla: JOB SECURITY
-
Incorporating Iris, Fingerprint and Face Biometric for Fraud Prevention in e-Passports Using Fuzzy Vault
PublikacjaA unified frame work which provides a higher security level to e-passports is proposed. This framework integrates face, iris and fingerprint images. It involves three layers of security: the first layer maps a biometric image to another biometric image which is called biostego image. Three mapping schemes are proposed: the first scheme maps single biometric image to single biostego image, the second scheme maps dual biometric images...
-
Scheduling with Complete Multipartite Incompatibility Graph on Parallel Machines: Complexity and Algorithms
PublikacjaIn this paper, the problem of scheduling on parallel machines with a presence of incompatibilities between jobs is considered. The incompatibility relation can be modeled as a complete multipartite graph in which each edge denotes a pair of jobs that cannot be scheduled on the same machine. The paper provides several results concerning schedules, optimal or approximate with respect to the two most popular criteria of optimality:...
-
New insights into modeling two-step nitrification in activated sludge systems – The effects of initial biomass concentrations, comammox and heterotrophic activities
PublikacjaIn this study, the conventional two-step nitrification model was extended with complete ammonia oxidation (comammox) and heterotrophic denitrification on soluble microbial products. The data for model calibration/validation were collected at four long-term washout experiments when the solid retention time (SRT) and hydraulic retention time (HRT) were progressively reduced from 4 d to 1 d, with mixed liquor suspended solids (MLSS)...
-
Moving object detection and tracking for the purpose of multimodal surveillance system in urban areas
PublikacjaBackground subtraction method based on mixture of Gaussians was employed to detect all regions in a video frame denoting moving objects. Kalman filters were used for establishing relations between the regions and real moving objects in a scene and for tracking them continuously. The objects were represented by rectangles. The objects coupling with adequate regions including the relation of many-to-many was studied experimentally...
-
Anonymity Architecture for Mobile Agent Systems
PublikacjaThe paper presents a new security architecture for MAS, which supports anonymity of agent owners. The architecture is composed of two main elements: Module I: Untraceability Protocol Infrastructure and Module II: Additional Untraceability Support. Module I is based on the recently proposed untraceability protocol for MAS and it forms the core of the anonymity architecture, which can be supported by the ele- ments of the second...
-
Analysis and comparision of safety of children and adult passanger in car based on crash tests results
PublikacjaThis paper presents analysis and comparision of safety of children and adult passanger in car based on crash tests results. The car crash test with four dummies, including two car seats allowed a direct comparison of the security under the same conditions of children and passengers directly to the car seat. Analysis of acceleration and video from the test allows to understand the phenomena during the collision, the air bags influence,...
-
Implementation of the Concept of Flexicurity in the Selected Countries of Central Eastern Europe
PublikacjaThe CEE countries have to create their own flexicurity policies which would take into account the employment policy guidelines, cultural traditions and socio-economic development. The aim of this article is to examine and evaluate the implementation of the flexicurity concept on the basis of the adopted set of composite indicators. The study covers 9 countries of the CEE region, and the research period covers the years 2007 and 2013....
-
MODELING THE pH EFFECTS ON NITROGEN REMOVAL IN THE ANAMMOX-ENRICHED GRANULAR SLUDGE
PublikacjaThe aim of the study was to determine the pH effects on nitrogen removal in the anammox-enriched 10 granular sludge. The experimental data were extracted from a 4L completely-mixed batch reactor with the 11 granular sludge at different initial pH values (6.5, 7, 7.5, 8, 8.5, 9, 9.5, 10, 10.5) and constant temperature 12 T=30℃. Simulations were run in GPS-X 6.4 using a comprehensive mechanistic model Mantis2. Two 13 kinetic parameters,...
-
Modeling the pH effects on nitrogen removal in the anammox-enriched granular sludge
PublikacjaThe aim of the study was to determine the pH effects on nitrogen removal in the anammox-enriched granular sludge. The experimental data were extracted from a 4L completely-mixed batch reactor with the granular sludge at different initial pH values (6.5, 7, 7.5, 8, 8.5, 9, 9.5, 10, 10.5) and constant temperature T=30℃. Simulations were run in GPS-X 6.4 using a comprehensive mechanistic model Mantis2. Two kinetic parameters, including...
-
Working Conditions in the Context of Global Value Chains and Routinisation: An Example of Polish Workers
PublikacjaThe paper aims to explore the linkages between global production fragmentation, routinisation and the well-being of workers in Poland. In particular, the focus is placed on the selected measures of working conditions, such as the social environment, work intensity, and working time quality to examine their dependence on involvement in international trade and the routinisation level. We merge individual data describing the working...
-
Performance Evaluation of the Parallel Codebook Algorithm for Background Subtraction in Video Stream
PublikacjaA background subtraction algorithm based on the codebook approach was implemented on a multi-core processor in a parallel form, using the OpenMP system. The aim of the experiments was to evaluate performance of the multithreaded algorithm in processing video streams recorded from monitoring cameras, depending on a number of computer cores used, method of task scheduling, image resolution and degree of image content variability....
-
Założenia modelu zarządzania kryzysowego bezpieczeństwem w portach morskich
PublikacjaZłożoność przestrzenna i gospodarcza oraz silne oddziaływanie działalności portowej na procesy społeczno-gospodarcze w regionie, wymaga opracowania specjalnego podejścia do zarządzania bezpieczeństwem na obszarach portowych. W pracy przedstawiono założenia modelu zarządzania kryzysowego bezpieczeństwem w portach morskich uwzględniające zasady międzynarodowego kodeksu ISPS (International Ship and Port Security Code) oraz wymagania...
-
Wykorzystanie programu AutoFocus do analizy protokołów kryptograficznych
PublikacjaAutoFocus jest narzędziem wspomagającym wytwarzanie systemów wbudowanych charakteryzujących się wysoką niezawodnością. Artykuł prezentuje studium przypadku zastosowania narzędzia i związanej z nim metody formalnej Focus do analizy bezpieczeństwa (ang. security) protokołu tworzenia podpisu cyfrowego w środowisku rozproszonym. Zastosowana metoda formalna wykorzystana została jako ostatni etap zintegrowanej metody oceny protokołów...
-
Radiokomunikacja morska - problemy eksploatacyjne i rozwój
PublikacjaW pracy omówiono stan obecny oraz wynikające z tego problemy eksploatacyjne występujące w radiokomunikacji morskiej, ze szczególnym odniesieniem do zagadnień związanych z bezpieczeństwem pracy na morzu. Scharakteryzowano kierunki rozwoju w obszarach głównych podsystemów składowych tej dziedziny łączności radiowej. Poruszono także coraz bardziej aktualny problem zastosowania systemów łączności dla potrzeb ochrony żeglugi (maritime...
-
Methods of deep modification of low-bearing soil for the foundation of new and spare air runways
PublikacjaAfter analyzing the impact of aircraft on the airport pavement (parking spaces, runways, startways), it was considered advisable to consider the problem of deep improvement or strengthening of its subsoil. This is especially true for low-bearing soil. The paper presents a quick and effective method of strengthening the subsoil intended for the construction of engineering structures used for civil...
-
Finite element method simulations of various cases of crash tests with N2/W4/A steel road barrier
PublikacjaThe subject of this study is performance of N2/W4/A steel road safety barrier investigated in numerical simulations. System was checked under several types of initial conditions, which were assumed basing on the TB11 and TB32 normative crash tests. The main goal of present study is to investigate the relationship between initial conditions (angle and velocity) of the impact and the severity indices (associated to the vehicle occupant) during...
-
Functionalized polyolefins, synthesis application and industrial relevance
PublikacjaPolymers play a key role in our modern life full of technical advances and a continuous request for new materials with tailored properties for a low price. Their excellent mechanical properties, good processability, chemical stability and low price make polyolefins the polymers of choice for most commodity and some more specialized applications. As a result, polyolefins account for over 65% of the total world demand of plastic...
-
Expedited Globalized Antenna Optimization by Principal Components and Variable-Fidelity EM Simulations: Application to Microstrip Antenna Design
PublikacjaParameter optimization, also referred to as design closure, is imperative in the development of modern antennas. Theoretical considerations along with rough dimension adjustment through supervised parameter sweeping can only yield initial designs that need to be further tuned to boost the antenna performance. The major challenges include handling of multi-dimensional parameter spaces while accounting for several objectives and...
-
Expedited Design Closure of Antenna Input Characteristics by Trust Region Gradient Search and Principal Component Analysis
PublikacjaOptimization-based parameter tuning has become an inherent part of contemporary antenna design process. For the sake of reliability, it is typically conducted at the level of full-wave electromagnetic (EM) simulation models. This may incur considerable computational expenses depending on the cost of an individual EM analysis, the number of adjustable variables, the type of task (local, global, single-/multi-objective optimization),...
-
Quasi-Global Optimization of Antenna Structures Using Principal Components and Affine Subspace-Spanned Surrogates
PublikacjaParametric optimization is a mandatory step in the design of contemporary antenna structures. Conceptual development can only provide rough initial designs that have to be further tuned, often extensively. Given the topological complexity of modern antennas, the design closure necessarily involves full-wave electromagnetic (EM) simulations and—in many cases—global search procedures. Both factors make antenna optimization a computationally...
-
Potential of Functionalized Polyolefins in a Sustainable Polymer Economy: Synthetic Strategies and Applications
PublikacjaPolymers play a crucial role in our modern life as no other material exists that is so versatile, moldable, and lightweight. Consequently, the demand for polymers will continue to grow with the human population, modernization, and technological developments. However, depleted fossil resources, increasing plastic waste production, ocean pollution, and related growing emission of greenhouse gases has led to a change in the way we...
-
CoRBAC – kontekstowo zorientowany model bezpieczeństwa
PublikacjaZaproponowano uogólniony model kontroli dostępu do usługowych systemów internetowych uwzględniający różne kategorie kontekstu. Określono wpływ kontekstu na model jak i architekturę systemu bezpieczeństwa. Podano przykład implementacji modelu i architektury bezpieczeństwa dla zestawu usług dotyczących e-uczelni i wstępnie oszacowano zalety takiego rozwiązania.
-
Radio system for monitoring and acquisition of data from traffic enforcement cameras - features and assumptions of the system
PublikacjaThe study presents the architecture and selected functional assumptions of Radio System for Monitoring and Acquisition of Data from Traffic Enforcement Cameras (RSMAD). Ultimately, the system will be used for transmission and archiving image data of traffic offenses, but can also perform other duties related to traffic safety. Implementation of the RSMAD system will facilitate, inter alia, issuing the fine process and supervision...
-
Modeling the impact of surface currents in a harbor using graph theory
PublikacjaEnsuring security in a harbor requires research into its infrastructure using spatial environmental data. This paper presents a methodology that defines the design of a graph for modeling the interactions between surface currents and moving objects. Combining this graph with port charts that integrate electronic navigation charts with coastal orthophotographs allows us to perform a multidimensional analysis. In addition, the complete...
-
Challenges in providing support for management of evidence-based arguments
PublikacjaThe paper considers selected challenges related to the application of evidence based arguments and maps them on the tool support level. In particular, we consider: communication and teamwork, handling large arguments, evidence management and integration, argument assessment and communication, change control and reporting, evidence reuse, user data security and argument portfolio management. Then we explain how these challenges...
-
RSS-Based DoA Estimation Using ESPAR Antenna for V2X Applications in 802.11p Frequency Band
PublikacjaIn this paper, we have proposed direction-of arrival (DoA) estimation of incoming signals for V2X applications in 802. 11p frequency band, based on recording of received signal strength (RSS) at electronically steerable parasitic array radiator (ESPAR) antenna's output port. The motivation of the work was to prove that ESPAR antenna used to increase connectivity and security in V2X communication can be also used for DoA estimation....
-
Analysis of human behavioral patterns
PublikacjaWidespread usage of Internet and mobile devices entailed growing requirements concerning security which in turn brought about development of biometric methods. However, a specially designed biometric system may infer more about users than just verifying their identity. Proper analysis of users’ characteristics may also tell much about their skills, preferences, feelings. This chapter presents biometric methods applied in several...
-
Improvements and new functionalities of UNRES server for coarse-grained modeling of protein structure, dynamics, and interactions
PublikacjaIn this paper we report the improvements and extensions of the UNRES server (https://unres-server.chem.ug.edu.pl) for physics-based simulations with the coarse-grained UNRES model of polypeptide chains. The improvements include the replacement of the old code with the recently optimized one and adding the recent scale-consistent variant of the UNRES force field, which performs better in the modeling of proteins with the β and the...
-
Transient detection for speech coding applications
PublikacjaSignal quality in speech codecs may be improved by selecting transients from speech signal and encoding them using a suitable method. This paper presents an algorithm for transient detection in speech signal. This algorithm operates in several frequency bands. Transient detection functions are calculated from energy measured in short frames of the signal. The final selection of transient frames is based on results of detection...
-
EU-Russian Relations and the Eastern Enlargement: Integration or Isolation
Publikacja -
Democratisation and Institutional Development in Romania after 1989
Publikacja -
Standards Conformity Framework in comparison with contemporary methods supporting standards application
PublikacjaAchieving and assessing conformity with standards and compliance with various sets of requirements generates significant costs for contemporary economies. Great deal of this is spent on fulfilment of safety and security requirements. However, standards application is not supported sufficiently by the tools available on the market. Therefore, Standards Conformity Framework (SCF) containing methods and tools which provide support...
-
The role and importance of WIMAX mobile system as a high-performance data transfer technology in wireless sensor networks for wide area monitoring applications
PublikacjaThe study discuses basic features and functional design of WiMAX Mobile system, based on the IEEE 802.16e (Release 1.5 Rev. 2.0) standard. The analysis has been made in terms of ability to use this system to transmit video stream related to monitoringof large agglomeration areas. What is more, the study includes comparison of technical parameters of WiMAX Mobile system with competitive systems such as: HSPA+ and UMTS-LTE, which...
-
Multi-Stage Video Analysis Framework
PublikacjaThe chapter is organized as follows. Section 2 presents the general structure of the proposed framework and a method of data exchange between system elements. Section 3 is describing the low-level analysis modules for detection and tracking of moving objects. In Section 4 we present the object classification module. Sections 5 and 6 describe specialized modules for detection and recognition of faces and license plates, respectively....
-
Recognition of hazardous acoustic events employing parallel processing on a supercomputing cluster . Rozpoznawanie niebezpiecznych zdarzeń dźwiękowych z wykorzystaniem równoległego przetwarzania na klastrze superkomputerowym
PublikacjaA method for automatic recognition of hazardous acoustic events operating on a super computing cluster is introduced. The methods employed for detecting and classifying the acoustic events are outlined. The evaluation of the recognition engine is provided: both on the training set and using real-life signals. The algorithms yield sufficient performance in practical conditions to be employed in security surveillance systems. The...
-
A Novel Multicast Architecture of Programmable Networks
PublikacjaIn the paper a multicast architecture for programmable networks based on separation of group management and network control tasks is proposed. Thanks to this separation, services which want to make use of multicast communications no longer have to implement low-level network functionalities and their operation is greatly simplified. Abstracting service’s view of the network into a fully connected cloud enables us to transparently...
-
Cybersecurity and Privacy in Standards for Smart Grids – a Comprehensive Survey
PublikacjaResilient information and communications technologies are a prerequisite for reliable operation of smart grid. In recent years, many standards for the new form of electricity network have been proposed, which results in operators and other smart grid stakeholders having difficulties in finding the documents which can be related to their particular problems. The purpose of this paper is to bring in all smart grid standards that...
-
Magnetism and structure of Li_xCoO2 and comparison to Na_xCoO2
PublikacjaW pracy dyskutowane są właściwości magnetyczne i strukturalne Li_xCoO2 dla 0.5< x< 1.0. Jon Co +4 znajduje się w stanie wysokospinowym w Li_xCoO2 dla zawartości litu od 0.94 do 1.00 i w stanie niskospinowym dla x od 0.50 do 0.78.
-
Energy policy and the role of bioenergy in Poland
PublikacjaPrzedstawiono sytuacje energetyczną kraju. Omówiono poszczególne sektory wytwarzania energii oraz zapotrzebowania na energię i paliwa. Omówiono przekształcenia sektorów energetycznych w Polsce na przestrzeni lat 1990-2002. Na tym tle przedstawiono techniczne, ekonomiczne, społeczne i prawne aspekty rozwoju energetyki źródeł odnawialnych a w szczególności opartych o bioenergię. Przedstawiono wnioski dla Polski płynące z dotychczasowych...
-
Hexakis(1-methylimidazole-kN3)iron(II) dichloride dihydrate
PublikacjaTytułowy związek, [Fe(C4H6N2)6]Cl2.2H2O jest izostrukturalny z odpowiednimi związkami Co, Ni i Ru. W kompleksowym kationie żelazo(II) jest koordynowane oktaedrycznie przez sześć ligandów 1-metyloimidazolowych. Jon ujemny jest agregatem dwóch jonów chlorkowych i dwóch cząsteczek wody połączonych wiązaniami wodorowymi.
-
Składniki mineralne
PublikacjaOpisano zawartość w żywności, przyswajalność oraz rolę w organizmie człowieka, tzw. składników mineralnych. Obecnie za składniki mineralne uważane są następujące pierwiastki: wapń, fosfor, siarka, sód, potas, chlor, magnez, żelazo, fluor, krzem, cynk, a także mangan, miedź, selen, jod, molibden, chrom, kobalt i bor.
-
Review of Structural Strength in the Event of a One-Leg Punch through for a Wind Turbine Installation Vessel
Publikacja -
Root Causes of Thin-Plate Buckling Damage at the Aft-End in Crude Oil Tanker and Verification through Buckling Analysis
Publikacja -
Global Structural Behavior and Leg Strength for Jack-Up Rigs with Varying Environmental Parameters
Publikacja -
Review the Ultimate Strength According to Welding Deformation Criteria of Thin Plates Under In-plane Compression
Publikacja -
Study of Heat Source Model and Residual Stress Caused by Welding in GMAW of Al Alloy
Publikacja -
Framework for RIDM within functional safety management process
PublikacjaThe functional safety management in life cycle is a complex process starting with identifying hazards and defining safety-related functions (SRFs) with risk assessment oriented at determining the safety integrity level. Another element of such life cycle is a verification of required SIL for designed safety-related system which implements safety function. Due to complexity of the problem, to overcome difficulties in safety-related...
-
Automatic Analysis of Trajectories of Moving Objects
PublikacjaOngoing monitoring is essential to providing security and safety of maritime and air operations. This paper presents the research in the area of automatic analysis of movement of unrestricted vehicles like ships and air-planes. The analysis is aimed at extraction of trajectory information, and the results can be used to identify anomalous behaviour in archived and real-time data. In this paper we focus on data acquired using the...
-
An Approach to the Detection of Bank Robbery Acts Employing Thermal Image Analysis
PublikacjaA novel approach to the detection of selected security-related events in bank monitoring systems is presented. Thermal camera images are used for the detection of people in difficult lighting conditions. Next, the algorithm analyses movement of objects detected in thermal or standard monitoring cameras using a method evolved from the motion history images algorithm. At the same time, thermal images are analyzed in order to detect...
-
Public spaces connecting cities. Green and Blue Infrastructures potential.
PublikacjaA city fragmentation causes a lot of negative effects in urban environment such as: disconnecting the environmental, functional and compositional relations, a loss of urban compactness, chaotic development, visual chaos, a domination of technical landscape, reduction of security. This is why one of main challenges for urban planners is to connect the fragmented structures by creating friendly, attractive and safe public space....