Filtry
wszystkich: 1692
-
Katalog
- Publikacje 1248 wyników po odfiltrowaniu
- Czasopisma 131 wyników po odfiltrowaniu
- Konferencje 82 wyników po odfiltrowaniu
- Wydawnictwa 1 wyników po odfiltrowaniu
- Osoby 44 wyników po odfiltrowaniu
- Projekty 9 wyników po odfiltrowaniu
- Kursy Online 16 wyników po odfiltrowaniu
- Wydarzenia 3 wyników po odfiltrowaniu
- Dane Badawcze 158 wyników po odfiltrowaniu
wyświetlamy 1000 najlepszych wyników Pomoc
Wyniki wyszukiwania dla: BATHING SECURITY
-
Joint foreign ownership and global value chains effects on productivity: a comparison of firms from Poland and Germany
PublikacjaPurpose The study aims to examine the joint effects of foreign ownership (FO) and involvement in global value chains (GVCs) on the productivity performance of firms from a catching-up country (Poland) and a leader economy (Germany). Design/methodology/approach The authors use micro-level data on firms combined with several sector-level GVC participation measures. The authors investigate whether the link between productivity and...
-
Rapid multi-objective optimization of antennas using nested kriging surrogates and single-fidelity EM simulation models
PublikacjaEver increasing performance requirements make the design of contemporary antenna systems a complex and multi-stage process. One of the challenges, pertinent to the emerging application areas but also some of the recent trends (miniaturization, demands for multi-functionality, etc.), is the necessity of handling several performance figures such as impedance matching, gain, or axial ratio, often over multiple frequency bands. The...
-
Tubular ultrafiltration car wash wastewater
Dane BadawczeThe commercial ultrafiltration (UF) tubular polyvinylidene fluoride (100 and 200 kDa) and polyethersulfone (4 kDa) membranes were applied for filtration of carwash wastewater. Intensive fouling was notice, which caused over 50% permeate flux reduction during 3-5 h of filtration process. This phenomenon was reduced by washing the membranes with alkaline...
-
Robust unsupervised georeferencing algorithm for aerial and satellite imagery
PublikacjaIn order to eliminate a human factor and fully automate the process of embedding the spatial localization information in a remote sensed image the integrated georeferencing method was proposed. The paper presents this unsupervised and robust approach which is comprised of pattern recognition, using SIFT-based detector, and RANSAC based outlier removal with matching algorithm.
-
Low-dimensional bound entanglement with one-way distillable cryptographic key
PublikacjaIn this paper, we provide a class of bound entangled states that have positive distillable secure key rate. The smallest state of this kind is 4 circle times 4, which shows that peculiar security contained in bound entangled states does not need high-dimensional systems. We show that for these states a positive key rate can be obtained by one-way Devetak-Winter (DW) protocol. Subsequently, the volume of bound entangled key-distillable...
-
Using EO satellite data in Safe City and Coastal Zone web-GIS
PublikacjaThe paper presents a novel design of a web-based Safe City & Coastal Zone GIS (SCCZ-GIS) which integrates data acquired from different remote sensing and geospatial data sources for monitoring the security of the coastal zone, its inhabitants and Critical Infrastructure. The system utilizes several innovative technologies and directly co-operates with different remote sensing data sources and services, like a satellite ground station...
-
A survey of neural networks usage for intrusion detection systems
PublikacjaIn recent years, advancements in the field of the artificial intelligence (AI) gained a huge momentum due to the worldwide appliance of this technology by the industry. One of the crucial areas of AI are neural networks (NN), which enable commer‐ cial utilization of functionalities previously not accessible by usage of computers. Intrusion detection system (IDS) presents one of the domains in which neural networks are widely tested...
-
E-Voting System Evaluation Based on the Council of Europe Recommendations: nVotes
PublikacjaE-voting implantation has been facing important challenges in recent years. Several incidents, together with a lack of evaluation methodologies social and cultural customs hinder a broader application. In this work, the authors aim to contribute to a safer introduction of e-voting tools by applying a practical evaluation framework strongly based on the security requirements issued by the Council of Europe (CoE) in 2017 to nvotes,...
-
Support for argument structures review and assessment
PublikacjaArgument structures are commonly used to develop and present cases for safety, security and for other properties of systems. Such structures tend to grow excessively, which causes problems with their review and assessment. Two issues are of particular interest: (1) systematic and explicit assessment of the compelling power of an argument, and (2) communication of the result of such an assessment to relevant recipients. The paper...
-
Hedging Strategies of Derivatives Instruments for Commodity Trading Entities
PublikacjaHedging as an outcome of risk management arises to account several questions. Mentioned aspect of size of the hedging is one of them. Latter questioning refers to whether producer of manufacturer are willing to secure entire exposure, when the hedging should start, now or later in the future, what is the vision on market like direction of market, time of interest, magnitude of exposure, what would be the preferred instruments of...
-
Induced Sheath Voltages In 110 Kv Power Cables – Case Study
PublikacjaThe paper considers shock hazard due to induced sheath voltages in 110 kV power cables. Various configurations of the metallic sheaths bonding and earthing (single-point bonding, both-ends bonding, cross-bonding) are analysed. Taking into account shock hazard and ability of the system to power transfer an optimal configuration is proposed.
-
Andrzej Chybicki dr inż.
OsobyZ wykształcenia informatyk, absolwent Wydziału Elektroniki, Telekomunikacji i Informatyki Politechniki Gdańskiej, doktor nauk technicznych w dziedzinie informatyka specjalizujący się w przetwarzaniau danych przestrzennych w rozproszonych systemach informatycznych. Ukierunkowany na wykorzystywanie osiągnięć i wiedzy zakresu prowadzonych badań w przemyśle. Współpracował z szeregiem podmiotów przemysłu informatycznego, geodezyjnego...
-
Uziemienia w zespołach elektrowni wiatrowych
PublikacjaW pracy jest omawiana problematyka budowy systemów uziemień na farmach elektrowni wiatrowych. Uziemienia poszczególnych elektrowni są wykorzystywane jako elementy systemu ochrony odgromowej oraz układu ochrony od porażeń otoczenia elektrowni wiatrowej. Farmy elektrowni są często umieszczane na gruntach o wysokiej rezystywności, co utrudnia realizację skutecznych systemów uziemień elektrowni. Trudność może napotykać zwłaszcza wykonanie...
-
Data from the survey on factors determining the employment of the Gdańsk University of Technology graduates’ in the opinion of entrepreneurs
Dane BadawczeThe dataset includes data from the survey on factors determining the employment of the Gdańsk University of Technology (GUT) graduates’ in the opinion of entrepreneurs. The survey was conducted in 2017. The research sample included 102 respondents representing various firms from Pomeranian Voivodship. The study concerned i.a. factors determining the...
-
Number of own bank branches (2017)
Dane BadawczeThe number of traditional bank branches is decreasing. As can be seen from the data presented in the table below, over the year (2016-2017), the network of bank branches in Poland decreased by over half a thousand (currently the total number of traditional bank branches, excluding partner branches, amounts to nearly 6 thousand). None of the 20 largest...
-
Enhancing Facial Palsy Treatment through Artificial Intelligence: From Diagnosis to Recovery Monitoring
PublikacjaThe objective of this study is to develop and assess a mobile application that leverages artificial intelligence (AI) to support the rehabilitation of individuals with facial nerve paralysis. The application features two primary functionalities: assessing the paralysis severity and facilitating the monitoring of rehabilitation exercises. The AI algorithm employed for this purpose was Google's ML Kit “face-detection”. The classification...
-
Centrifugal magnetic fluid seals
PublikacjaSeals perform an important and at times overlooked function in a lubricant system. They prevent or minimize the movement of the lubricant between two surfaces and also minimize the level of contamination in the system. Seals are divided into static and dynamic types. Static seals operate in systems where the mating surfaces do not move relative to each other. In contrast, dynamic seals operate under conditions where the mating surfaces...
-
Coastal zone monitoring using Sentinel-1 SAR polarymetry data
PublikacjaIn recent years the role of the surveillance and security of Polish boundaries has significantly increased. Polish coastal zone monitoring requires various approaches using various technological means in order to ensure the protection of Polish boundaries. In this paper, the authors discuss and present alternatives to underwater surveillance methods of coastal area analysis and monitoring using data retrieved from the newly developed...
-
ADAPTIVE PREDICTIONS OF THE EURO/ZŁOTY CURRENCY EXCHANGE RATE USING STATE SPACE WAVELET NETWORKS AND FORECAST COMBINATIONS
PublikacjaThe paper considers the forecasting of the euro/Polish złoty (EUR/PLN) spot exchange rate by applying state space wavelet network and econometric forecast combination models. Both prediction methods are applied to produce one-trading-day- ahead forecasts of the EUR/PLN exchange rate. The paper presents the general state space wavelet network and forecast combination models as well as their underlying principles. The state space...
-
A fair distribution scheme for joint fingerprinting and decryption methods= Sprawiedliwy schemat dystrybucji dla metod łącznego osadzania odcisku palca oraz deszyfracji
PublikacjaThe paper addresses the fairness of the security provided by digital fingerprinting methods. It was noted that the digital fingerprinting techniques are designed primarily to protect service providers against the actions of malicious users, while honest users remain vulnerable to acts of malicious providers. The paper describes the customer's rights problem and the unbinding problem, which also apply to joint fingerprinting and...
-
Integration and Visualization of the Results of Hydrodynamic Models in the Maritime Network-Centric GIS of Gulf of Gdansk
PublikacjaEnsuring of security in the coastal area makes on a seaside countries research in the field of infrastructure spatial information of environmental data. The paper presents the results of work on the construction of this infrastructure by integrating electronic navigational chart with ortophotomaps of coastal areas as well as numerical data from weather and hydrodynamic models. Paper focuses on a problems associated with creating...
-
Reconfigurable Antennas for Trustable Things
PublikacjaIn modern applications, the Internet of Things plays a significant role in increasing the productivity, effectiveness or safety and security of people and assets. Additionally, the reliability of Internet of Things components is crucial from the application point of view, where a resilient and low-latency network is needed. This can be achieved by utilizing reconfigurable antennas to enhance the capabilities of the wireless sensor...
-
Deep Learning: A Case Study for Image Recognition Using Transfer Learning
PublikacjaDeep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...
-
Deep Learning
PublikacjaDeep learning (DL) is a rising star of machine learning (ML) and artificial intelligence (AI) domains. Until 2006, many researchers had attempted to build deep neural networks (DNN), but most of them failed. In 2006, it was proven that deep neural networks are one of the most crucial inventions for the 21st century. Nowadays, DNN are being used as a key technology for many different domains: self-driven vehicles, smart cities,...
-
I, Robot: between angel and evil
PublikacjaThe boosting of most digital innovations within recent technology progress by artificial intelligence (AI) constitutes a growing topic of interest. Besides its technical aspects, increasing research activity may be observed in the domain of security challenges, and therefore of responsibility related to the controlled or hypothetically uncontrolled or autonomous emergence of AI solutions. Consequently, responsibility and ethics...
-
A model-based approach to analysis of authentication protocols.
PublikacjaW referacie przedstawiono zintegrowane podejście do analizy protokołów uwierzytelniania o nazwie Object-oriented Formal Authentication Protocol Security Analysis Framework (OF-APSAF). Podejście to jest zaprojektowane na bazie sprawdzonej metody formalnej CSP wraz z narzędziami ją wspierającymi: Casper oraz FDR. Jego integralną częścią jest półformalna zorientowana obiektowo technika modelowania protokołów, ich kontekstu oraz wymagań...
-
Methodological issues of functional safety and reliability assessment of critical systems in industrial hazardous plants
PublikacjaThe aim of this article is to identify and discuss some methodological issues that are of interest among functional safety specialists and experts after publication of the second edition of international standards IEC 61508 and IEC 61511, including the design and implementing the safety-related functions of higher safety integrity levels and protection layers. The basic role of safety-related systems is to reduce effectively and...
-
Health monitoring services based on off-the-shelf mobile devices
PublikacjaDevelopment of health monitoring systems usually involves usage of dedicated devices with provided guarantees in terms of their reliability. Those devices raise the cost of the whole system, because of which such platforms are limited only to specific areas and constrained number of users. Usage of off-the- shelf devices could lower the cost and bring those systems to the masses. The paper covers possible uses of common off-the-shelf...
-
The Impact of Ergonomic Guiding Principles on the Formation of Modern Monumental Art
PublikacjaCommemoration of historic events is now a commonplace phenomenon both in culture and in academic research. The phenomenon is linked to an increase in the representation of the visualisation of the past in public sphere, which in turn leads to reformulation of monumental art. Modern monuments are often spatial forms consisting both of sculpture installation and bigger constructions. In case of these realisations, the designers,...
-
Functional safety with cybersecurity for the control and protection systems on example of the oil port infrastructure
PublikacjaSafety and cybersecurity aspects consist of two different group of functional requirements for the industrial control and protection systems in the oil port installation. It is the main reason why the analyses of safety and cybersecurity shouldn’t be integrated directly. These article presented some important issues of the functional safety analysis with regard to cybersecurity aspects in the oil seaport infrastructure. The proposed...
-
Stradar - Multimedia Dispatcher and Teleinformation System for the Border Guard
PublikacjaSecurity of national borders requires utilization of multimedia surveillance systems automatically gathering, processing and sharing various data. The paper presents such a system developed for the Maritime Division of the Polish Border Guard within the STRADAR project. The system, apart from providing communication means, gathers data, such as map data from AIS, GPS and radar receivers, videos and photos from camera or audio from...
-
Techniczne aspekty implementacji nowoczesnej platformy e-learningowej
PublikacjaZaprezentowano aspekty techniczne implementacji nowoczesnej platformy nauczania zdalnego. Omówiono obszary funkcjonalne takie jak: system zarządzania nauczaniem, serwis informacyjny, dodatkowe oprogramowanie dydaktyczne oraz kolekcja zasobów multimedialnych. Przybliżono zagadnienia związane z bezpieczeństwem takiej platformy. Na końcu przedstawiono parametry techniczne wdrożonej na Politechnice Gdańskiej platformy eNauczanie.
-
Have you heard about ALAN? Now, there is also ROLAN!
PublikacjaThis article examines the new ROLAN movement and points out why this might be the next big thing for lighting professionals.
-
Adaptive Method for Modeling of Temporal Dependencies between Fields of Vision in Multi-Camera Surveillance Systems
PublikacjaA method of modeling the time of object transition between given pairs of cameras based on the Gaussian Mixture Model (GMM) is proposed in this article. Temporal dependencies modeling is a part of object re-identification based on the multi-camera experimental framework. The previously utilized Expectation-Maximization (EM) approach, requiring setting the number of mixtures arbitrarily as an input parameter, was extended with the...
-
COLON, Ascending colon - Female, 79 - Tissue image [8200729592213421]
Dane BadawczeThis is the histopathological image of COLON tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
COLON, Ascending colon - Female, 79 - Tissue image [8200729592216271]
Dane BadawczeThis is the histopathological image of COLON tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Optimal edge-coloring with edge rate constraints
PublikacjaWe consider the problem of covering the edges of a graph by a sequence of matchings subject to the constraint that each edge e appears in at least a given fraction r(e) of the matchings. Although it can be determined in polynomial time whether such a sequence of matchings exists or not [Grötschel et al., Combinatorica (1981), 169–197], we show that several questions about the length of the sequence are computationally intractable....
-
Knowledge engineer – more than only technical position. The concept of knowledge engineering education at the Faculty of Management and Economics
PublikacjaOrganizational learning means an effective knowledge management. Management is nothing more than the constant decision-making. Therefore organizational learning must be seen through the prism of decisions taken at all levels. Unfortunately decisions are never taken within comfortable conditions. Decision maker suffers from a lack of any support. There is often a problem with human resources having right skills, sometimes they do...
-
A METHOD OF TRUST MANAGEMENT IN WIRELESS SENSOR NETWORKS
PublikacjaThe research problem considered in this paper is how to protect wireless sensor networks (WSN) against cyber-threats by applying trust management and how to strengthen network resilience to attacks targeting the trust management mechanism itself. A new method, called WSN Cooperative Trust Management Method (WCT2M), of distributed trust management in multi-layer wireless sensor networks is proposed and its performance is evaluated....
-
Bartosz Sawik
OsobyDr Bartosz Sawik is a Professor at the Department of Business Informatics and Engineering Management, AGH University of Science and Technology, Krakow, Poland and at the Institute of Smart Cities, GILT-OR Group, Department of Statistics, Computer Science and Mathematics, Public University of Navarre, Pamplona, Spain. He is a Visiting Researcher at the University of California, Berkeley, USA. He has a Ph.D. and a M.Sc. and Eng....
-
SEM images of Ni-Mo2CTx/Mo2Ga2C before and after catalytic dry reforming of methane
Dane BadawczeThe dataset includes SEM images of Ni-Mo2CTx/Mo2Ga2C catalysts before and after the dry reforming of methane.
-
A comprehensive overview of software product management challenges
PublikacjaThe principal focus of software product management is to ensure the economic success of the product, which means to prolong the product life as much as possible with modest expenditures to maximizs profits. Software product managers play an important role in the software development organization while being responsible for the strategy, business case, product roadmap, high-level requirements, product deployment (release-management),...
-
Tracking body movement for radio channel measurements in BAN with indoor positioning system
PublikacjaThis paper presents indoor positioning system based on inertial navigation with additional distance measurements using UWB modems and map matching to increase accuracy and eliminate position drift. Such system may be used to track position of human body during radio channel measurements for body area networks. Performance of proposed system and limitations caused by inertial navigation are briefly described.
-
Report no WOiO/II/67/2015 - Expertise about load capacity of twistlock foundation and sliding foundation
PublikacjaCustomer delivered to Laboratory 17 elements - twist lock foundations and sliding lock foundations (ship equipment for container lashing). Elements were selected from production series. Each element was loaded for braking load. After test visual inspection had been performed. The expertise contains: description of tested elements, test assumptions, test stand, results and conclusions
-
Detection of Closing Crack in Beam Based on Responses Induced by Harmonic Excitation
PublikacjaThe non-linear contact model was chosen to simulate the closed crack in the cantilever beam. The study examines the shape and characteristics of the phase diagram of a cantilever beam with closed cracks. It investigates how various crack properties influence the geometry of the phase diagram and proposes a method for identifying cracks based on their features. The area of each closed curve in the phase diagram is determined using...
-
OCHRONA PRYWATNOŚCI W SYSTEMACH MONITORINGU WIZYJNEGO, PRZEGLĄD OPRACOWANYCH ARCHITEKTUR I ALGORYTMÓW
PublikacjaNieustannie rozwijające się technologie informacyjne związane z inteligentnym monitoringiem wizyjnym stwarzają ryzyko niewłaściwego wykorzystywania danych osobowych. W celu zapewnienia prawidłowej ochrony materiału wizyjnego, w ramach projektów realizowanych w Katedrze Systemów Multimedialnych WETI PG, opracowany został szereg architektur i algorytmów, które ułatwiają ochronę danych wrażliwych, takich jak: wizerunki osób, numery...
-
Abuse or contamination? Ratio determination of clenbuterol enantiomers to distinguish between doping use and meat contamination
PublikacjaClenbuterol has been detected in urine of several athletes during routine doping control in the past years. Athletes claimed that the clenbuterol was ingested by eating contaminated meat. Providing analytical prove for this claim is difficult. clenbuterol consists of two enantiomers, R(-) and S(+)-clenbuterol. Currently available human and veterinary preparations were found to consist of a racemic mixture of both enantiomers. When...
-
Software Quality, Reliability, and Security (International Conference on Quality Software [QSIC])
Konferencje -
Joint Working Conference on Secure Information Networks: Communications and Multimedia Security
Konferencje -
ACM Workshop on Formal Methods in Security Engineering: From Specifications to Code
Konferencje