Filtry
wszystkich: 2421
-
Katalog
- Publikacje 2018 wyników po odfiltrowaniu
- Czasopisma 222 wyników po odfiltrowaniu
- Konferencje 3 wyników po odfiltrowaniu
- Osoby 42 wyników po odfiltrowaniu
- Wynalazki 1 wyników po odfiltrowaniu
- Projekty 2 wyników po odfiltrowaniu
- Kursy Online 52 wyników po odfiltrowaniu
- Wydarzenia 3 wyników po odfiltrowaniu
- Dane Badawcze 78 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: BIOLOGICAL THREATS
-
Wireless systems of threats monitoring
Publikacja -
Wireless Systems of Threats Monitoring
Publikacja -
Wireless systems of threats monitoring
Publikacja -
Wireless systems of threats monitoring
Publikacja -
Wireless systems of threats monitoring
PublikacjaThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Wireless Systems of Threats Monitoring
PublikacjaConcept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Wireless systems of threats monitoring
PublikacjaThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements.
-
Wireless Systems of Threats Monitoring
PublikacjaThe concept of wireless system of threats monitoring with self-organizing network of multipurpose data transfer nodes are presented. Two practical applications of this system are also presented. The first of these is the Global Wireless Monitoring System for Containers, and the second is the Mobile Monitoring System for Gas Air Pollution Measurements. Presented practical applications of the wireless threats monitoring system is...
-
Malware - a survey on threats and mitigation techniques
PublikacjaThis paper presents up-to-date knowledge related to malware – malicious software. Firstly the definitions are presented and discussed briefly. Next, the paper presents a bit of motivation along with the malware fighting objectives. Malware poses an emerging threat in accordance to smart grids in general and advanced metering infrastructure in particular. The discussion is then directed towards known taxonomy along with a new proposal...
-
Mobile Security: Threats and Best Practices
PublikacjaCommunicating mobile security threats and best practices has become a central objective due to the ongoing discovery of new vulnerabilities of mobile devices. To cope with this overarching issue, the goal of this paper is to identify and analyze existing threats and best practices in the domain of mobile security. To this extent, we conducted a literature review based on a set of keywords. The obtained results concern recognizable...
-
ChatGPT - opportunities or threats in the educational process
Publikacja -
INTERNATIONAL JOURNAL OF BIOLOGICAL MACROMOLECULES
Czasopisma -
LIGHT POLLUTION IN THE CONTEXT OF THREATS TO THE WILDLIFE CORRIDORS
PublikacjaAccess to remote sensing night-time imagery allows for modeling of light pollution Increasingly, data on the propagation of artificial light are a source of interesting information for different fields of science and affect the planning of economic development. The article presents the problem of light pollution in the context of threats to the wildlife corridors in Poland. Wildlife corridors are areas that allow safe migration...
-
Threats to Rural Landscape and Its Protection in Poland
PublikacjaThe article describes the premises and conditions for the implementation of a pro-landscape spatial policy in rural areas in Poland. It presents the erosion of spatial order in a large part of the country’s territory. Firstly, the state of protection of the rural landscape and the legal aspects of shaping the space of rural areas are described. Secondly, the location is depicted, and the main physiognomic and environmental threats...
-
Digital Threats: Research and Practice
Czasopisma -
JOURNAL OF BIOLOGICAL CHEMISTRY
Czasopisma -
Investigation of Noise Threats and Their Impact on Hearing in Selected Schools
PublikacjaNoise measurements conducted in selected schools in Gdansk area are presented in this paper. The main aim of this research was to determine noise threats at schools. Some objective measurements of the acoustic climate were performed employing a noise monitoring station engineered at the Multimedia System Department, Gdansk University of Technology. Simultaneously, subjective noise annoyance examinations were carried out among pupils...
-
Early detection of imminent threats in social relation graphs
PublikacjaWczesne wykrywanie zagrożeń i anomalii w sieciach społecznych jest dziś prawdziwym wyzwaniem. Ludzie w realnym świecie tworzą wiele złożonych relacji społecznych, które mogą być przedstawione za pomocą grafów, w których węzły reprezentują aktorów (pojedyncze osoby lub organizacje) a krawędzie wskazują na powiązania pomiędzy nimi. Analiza nieustannie zmieniających się relacji pomiędzy aktorami może wskazać konkretne nadciągające...
-
ECOLOGICAL ENGINEERING
Czasopisma -
Białowieża Forest: A new threat
Publikacja -
WP1 of INDECT Project: Intelligent Monitoring and Automatic Detection of Threats
Publikacja -
WP1: Intelligent Monitoring and Automatic Detection of Threats - partners cooperation
Publikacja -
WP1: Intelligent monitoring and automatic detection of threats -introduction to the WP1
Publikacja -
A video monitoring system using ontology-driven identification of threats
PublikacjaIn this paper, we present a video monitoring systemthat leverages image recognition and ontological reasoningabout threats. In the solution, an image processing subsystemuses video recording of a monitored area and recognizesknown concepts in scenes. Then, a reasoning subsystem uses anontological description of security conditions and informationfrom image recognition to check if a violation of a conditionhas occurred. If a threat...
-
Imminent threats analysis and security level evaluation in social networks
PublikacjaRozprawa doktorska poświęcona jest analizie nadciągających zagrożeń w sieciach społecznych. Dotyczy to takich zjawisk jak spam, phishing, kradzież tożsamości czy ataki na systemy reputacji w serwisach aukcji internetowych. W pracy zaproponowano metodę pozwalającą na wczesne wykrycie zagrożeń w sieciach społecznych w oparciu o zdefiniowane modele zachowań aktorów sieci. Modele zachowań tworzone są za pomocą podgrafów wzorcowych...
-
Ad hoc routing protocols - security objectives, threats and solution
PublikacjaZaprezentowano przykładowe strategie routingu stosowane w bezprzewodowych sieciach ad-hoc z transmisją wieloetapową. Dokonanao przegladu protokołow routingu, zidentyfikowano podstawowe typy ataków i zagrożenia integralności i poufności transmisji w sieciach bezprzewodowych. Przedstawiono przykładowe rozwiazania algorytmów routingu.
-
Teaching Architecture – contemporary challenges and threats in the complexity of built environment
PublikacjaThe complexity of the modern built environment is a problem n ot only of architectural and urban issues. This issue extends to many othe r disciplines as well as covering a wide range of social engagements. The idea of writing this pa per is generally initiated by the debate which took place in Gdańs k on 22.01.2016, and was prepar ed in order to meet representatives of the four circles of interest...
-
Carsharing - Opportunities and Threats for Cities: Proposals of Solutions for Urban Policy
PublikacjaThe carsharing of a current generation is a short-term car renting service with a capability to find in the nearest surrounding a fleet car parked anywhere in the public space where the previous user left it, as well as to book, open, rent and pay of, with the use of a dedicated mobile application. Nowadays, only a minority of municipalities is considering implementing the carsharing in their policies. The lack of awareness of...
-
BIOLOGICAL TRACE ELEMENT RESEARCH
Czasopisma -
BIOLOGICAL CONSERVATION
Czasopisma -
Automatic audio-visual threat detection
PublikacjaThe concept, practical realization and application of a system for detection and classification of hazardous situations based on multimodal sound and vision analysis are presented. The device consists of new kind multichannel miniature sound intensity sensors, digital Pan Tilt Zoom and fixed cameras and a bundle of signal processing algorithms. The simultaneous analysis of multimodal signals can significantly improve the accuracy...
-
Ontology oriented threat detection system
PublikacjaW niniejszym artykule przedstawiony jest projekt opartego o ntologię systemu wykrywania zagrożeń w różnego typu monitorowanych środowiskach (OOTDS). Zakłada się, że umieszczone w środowisku czujniki na bieżąco dostarczają systemowi zdarzeń odzwierciedlających zmiany zachodzące w środowisku. Korzystając z sieci asynchronicznych bloków rosnącej złożoności OOTDS dokonuje analizy otrzymanych zdarzeń. Bloki wstępnego przetwarzania konwertują...
-
Shopping Centres - a Threat to Public Spaces?
PublikacjaObszary wewnętrznych przestrzeni pieszych w centrach handlowych stają się substytutami śródmiejskich przestrzeni publicznych miast. Mimo ich stylizacji architektonicznej na ulice handlowe nie spełniają takiej samej funkcji jak przestrzenie tradycyjne. Powoduje to zagrożenia związane ze wzrostem znaczenia konsumpcjonizmu i tworzenia zamkniętych przestrzeni prywatnych niedostępnych dla całego społeczeństwa. Mimo to mogą one być elementami...
-
Threat intelligence platform for the energy sector
PublikacjaIn recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...
-
Investigation of noise threats and their impact on hearing in selected schools - a pilot study.
PublikacjaNoise measurements conducted in selected schools in Gdansk area are presented in this paper. The main aim of this research was to determine noise threats at schools. Some objective measurements of the acoustic climate were performed employing a noise monitoring station engineered at the Multimedia System Department, Gdansk University of Technology. Simultaneously, subjective noise annoyance examinations were carried out among pupils...
-
BIOLOGICALS
Czasopisma -
Operational analysis of threats to the security of NATO’s eastern flank. Context of hybrid activities
Publikacja -
Transport of dangerous goods by rail, and threats to the subsoil of the railway surface in the event of a disaster
PublikacjaIn Poland, in 2020, the mass of dangerous goods (loads) transported by rail was 26 151.06 thousand tone. This translated into the performance of 8 899 691.89 thousand tone - km of transport performance. In 2020, these figures accounted for 11.72% of the weight of goods transported by rail. The situation is similar in other countries around the world. With such a large volume of transport of dangerous...
-
Threats to Armenia’s Security in the National Strategy and Practice with Special Emphasis on External Security,
PublikacjaThe national security strategy adopted in 2007 provided a detailed definition of security and identified its threats. The key threat to the Armenian state was considered to be the Nagorno-Karabakh conflict. The document indicated the Collective Security Treaty Organisation main guarantor of security, with Russia being Armenia’s main partner in bilateral relations. The second position in the strategy was assigned to cooperation...
-
Credibility of Threats to Jam Anonymous Traffic Remapping Attacks in Ad Hoc WLANs
PublikacjaIn ad hoc networks, selfish stations can pursue a better quality of service (QoS) by performing traffic remapping attacks (TRAs), i.e., by falsely assigning their traffic to a higher priority class, which can hurt honest stations’ QoS. To discourage the attackers, honest stations can announce their dissatisfaction with the perceived QoS. If such a threat fails, a costly data frame jamming defense can be launched. We analyze the...
-
Ionic liquids - greener solvents or environmental threat?
PublikacjaZe względu na niemierzalnie niską prężność par ciecze jonowe były uważane za 'zielone rozpuszczalniki'. Ich zastosowanie w technologiach (bio)chemicznych przynosi korzyści nie tylko ekologiczne ale również ekonomiczne. Niemniej jednak zanieczyszczenie środowiska poprzez przedostanie się cieczy jonowych do gleb i wód gruntowych wraz ze ściekami/odciekami przemysłowymi lub w wyniku przypadkowych rozlewów stanowi realne zagrożenie....
-
Financial threat profiles of industrial enterprises in Poland
Publikacja -
Zika virus infection – a new epidemic threat
Publikacja -
BIOLOGICAL CONTROL
Czasopisma -
BIOLOGICAL BULLETIN
Czasopisma -
BIOLOGICAL PSYCHIATRY
Czasopisma -
BIOLOGICAL CYBERNETICS
Czasopisma -
Biological Communications
Czasopisma -
Biological Theory
Czasopisma -
Monitoring of Selected CBRN Threats in the Air in Industrial Areas with the Use of Unmanned Aerial Vehicles
Publikacja