Filtry
wszystkich: 1433
-
Katalog
- Publikacje 837 wyników po odfiltrowaniu
- Czasopisma 299 wyników po odfiltrowaniu
- Konferencje 82 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 36 wyników po odfiltrowaniu
- Projekty 8 wyników po odfiltrowaniu
- Kursy Online 11 wyników po odfiltrowaniu
- Dane Badawcze 159 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: SECURITY ONTOLOGY
-
Self-Organizing Wireless Monitoring System for Containers
PublikacjaThis paper presents a description of new global monitoring system for containers, with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing Container Monitoring Network...
-
Self-organizing wireless monitoring system for cargo containers
PublikacjaThis paper presents a description of new global monitoring system for containers with its layer-modular structure, as a solution for enhance security and efficiency of container transport with particular emphasis on the practical implementation of that system for maritime container terminals. Especially the Smart Container Module (SCM) architecture and its operation as a part of the Self-Organizing ContainerMonitoring Network is...
-
A place of school in the idea of the sustainable development
PublikacjaWell designed school space enables social contacts, increases activity of pupils and improves the condition of their health. However, the best design would not bring the expected benefits if it is not integrated with the surroundings in terms of transportation, security and local needs. In the sustainable development, the social goals are in harmony with ecological aims according to the rule of "3 r" (reduce, reuse, recycle).
-
International Conference on Information Security and Assurance
Konferencje -
International Conference on Security in Pervasive Computing
Konferencje -
International Conference on Computational Intelligence and Security
Konferencje -
International Workshop on Visualization for Cyber Security
Konferencje -
Australian Information Security Management Conference
Konferencje -
Information Hiding and Multimedia Security Workshop
Konferencje -
International Conference on Information and Communications Security
Konferencje -
International Conference on Information Theoretic Security
Konferencje -
International Conference on Principles of Security and Trust
Konferencje -
IFIP Information Security & Privacy Conference
Konferencje -
Australasian Conference on Information Security and Privacy
Konferencje -
International Workshop on Information Security Applications
Konferencje -
International IEEE Security in Storage Workshop
Konferencje -
International Conference on Information Security and Cryptology
Konferencje -
Workshop on Security and Privacy in e-Commerce
Konferencje -
Computational Intelligence in Security for Information Systems
Konferencje -
International Conference on Security of Information and Networks
Konferencje -
International Conference on Information Systems Security
Konferencje -
Australian Information Warfare and Security Conference
Konferencje -
Financial Cryptography and Data Security Conference
Konferencje -
Workshop in Information Security Theory and Practices
Konferencje -
International Conference on Information Security and Cryptography
Konferencje -
International Symposium on Information Assurance and Security
Konferencje -
Australasia Conference on Information Security and Privacy
Konferencje -
International Conference on Cryptology and Network Security
Konferencje -
Symposium on Requirements Engineering for Information Security
Konferencje -
SKLOIS Conference on Information Security and Cryptology
Konferencje -
Annual Conference on Privacy, Security and Trust
Konferencje -
International Workshop on Issues in the Theory of Security
Konferencje -
Information Security Practice and Experience Conference
Konferencje -
International Conference on network and System Security
Konferencje -
International Workshop on Security in Information Systems
Konferencje -
IEEE European Symposium on Security and Privacy
Konferencje -
ACM Conference on Computer and Communications Security
Konferencje -
Annual Computer Security Applications Conference
Konferencje -
European Symposium On Research In Computer Security
Konferencje -
International Conference on Availability, Reliability and Security
Konferencje -
Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks
PublikacjaThe increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated...
-
Adam Wronkowski dr inż.
OsobyDoktor nauk społecznych w dyscyplinie geografia społeczno-ekonomiczna i gospodarka przestrzenna. Adiunkt na Wydziale Geografii Społeczno-Ekonomicznej i Gospodarki Przestrzennej Uniwersytetu im. Adama Mickiewicza w Poznaniu. Należy do Zakładu Gospodarki Przestrzennej i Projektowania Urbanistycznego. Moje zainteresowania naukowe obejmują geografie dzieci i osób młodych, w tym w szczególności niezależną mobilność, sprawczość i wzajemne...
-
Implementing decisional trust: a first approach for smart reliable systems
PublikacjaIn this article, we introduce the necessary elements that must be integrated in order to achieve a decisional technology that is trustworthy. Thus, we refer to such technology as decisional trust. For us, decisional trust can be achieved through the use of elements such as the decisional DNA, reflexive ontologies, and security models; and therefore, we present in this article a framework that was used for the implementation of...
-
A Semantic Algebra for Modularized Description Logics Knowledge Bases
PublikacjaPublikacja wprowadza pojęcia modularyzacji ontologii opartej na tzw. modułach semantycznych (s-modułach) oraz algebry s-modułów. W pracy zawarto szereg twierdzeń opisujących właściwości algebry, jej związku z klasą algebr cylindrycznych oraz przedyskutowano możliwości zastosowania prezentowanych idei.
-
Asia Conference on Information, Computer and Communications Security (ACM Symposium on Information, Computer and Communications Security)
Konferencje -
Nodal cooperation equilibrium analysis in multi-hop wireless ad hoc networks with a reputation system
PublikacjaMotivated by the concerns of cooperation security, this work examines selected principles of state-of-the-art reputation systems for multi-hop ad hoc networks and their impact upon optimal strategies for rational nodes. An analytic framework is proposed and used for identification of effective cooperation-enforcement schemes. It is pointed out that optimum rather than high reputation can be expected to be sought by rational nodes.
-
Resolving conflicts in object tracking for automatic detection of events in video
PublikacjaAn algorithm for resolving conflicts in tracking of moving objects is presented. The proposed approach utilizes predicted states calculated by Kalman filters for estimation of trackers position, then it uses color and texture descriptors in order to match moving objects with trackers. Problematic situations, such as splitting objects, are addressed. Test results are presented and discussed. The algorithm may be used in the system...
-
Towards Cognitive and Perceptive Video Systems
PublikacjaIn this chapter we cover research and development issues related to smart cameras. We discuss challenges, new technologies and algorithms, applications and the evaluation of today’s technologies. We will cover problems related to software, hardware, communication, embedded and distributed systems, multi-modal sensors, privacy and security. We also discuss future trends and market expectations from the customer’s point of view.
-
Secure Quaternion Feistel Cipher for DICOM Images
PublikacjaAn improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...
-
A Paradigm for HV, MV, LV Distribution Grid Development Planning
PublikacjaIn the literature, including that relating to businesses in the energy (and power) sector, the concept of these organizations’ operating paradigm may be found. The paper discusses the concept of the paradigm, with a focus on the power grid development planning paradigm. Against this background, issues related to energy security and power systems development trends and problems are presented. A new paradigm is proposed for distribution...