Filtry
wszystkich: 618
-
Katalog
Wyniki wyszukiwania dla: TERRORIST ATTACK
-
Structural Transformation to Attain Responsible BIOSciences (STARBIOS2): Protocol for a Horizon 2020 Funded European Multicenter Project to Promote Responsible Research and Innovation
Publikacja -
LSA Is not Dead: Improving Results of Domain-Specific Information Retrieval System Using Stack Overflow Questions Tags
PublikacjaThe paper presents the approach to using tags from Stack Overflow questions as a data source in the process of building domain-specific unsupervised term embeddings. Using a huge dataset of Stack Overflow posts, our solution employs the LSA algorithm to learn latent representations of information technology terms. The paper also presents the Teamy.ai system, currently developed by Scalac company, which serves as a platform that...
-
Projektowanie, realizacja i eksploatacja attyk budynków mieszkalnych w aspekcie usterek i uszkodzeń cieplno-wilgotnościowych
PublikacjaW artykule przedstawiono w sposób syntetyczny zestawienie najbardziej istotnych zasad projektowania attyk w budynkach realizowanych w technologii tradycyjnej oraz tradycyjnej udoskonalonej. Zamieszczono zestawienie najczęściej popełnianych błędów wykonawczych oraz ich wpływ na rozkład pola temperatur w węzłach stropowo-ściennych. Zaproponowano rozwiązania projektowe ograniczając występowanie useterek cieplno-wilgotnościowech w...
-
Fluorescence resonance energy transfer usage to track the sequence promoter changes in CGB5 gene in ovarian cancer patients
Publikacja -
60 GHz Microstrip Van Atta Arrays for Millimeter Wave Identification and Localization
Publikacja -
60 GHz Microstrip Van Atta Arrays for Millimeter Wave Identification and Localization
PublikacjaIn this paper performance comparison of co-polarized and cross-polarized microstrip Van Atta arrays working in the 60 GHz frequency range is presented. They can be treated as simple chipless RFID tags with frequency response based identification. Tags with three different nominal resonance frequencies of 57, 62 and 67 GHz are designed by scaling optimized base model. Designed 62 GHz co-polarized and cross-polarized arrays with...
-
Trustworthiness and Subversion in Large Service- Oriented Multi-Agent Systems under Virtual Anonymity and Blind Provider Selection
PublikacjaTo promote honest service provision in multi-agent systems, a Computational Trustworthiness and Rating scheme collects service ratings and computes agents' trustworthiness levels (TLs). Studies of existing schemes fail to reflect closed-loop dynamics of TLs arising from the mutual influence of agents' behavior and TLs, and to capture relevant properties. Recent simulative and analytical models produce results tied to a particular...
-
The AFM micrographs of pitting corrosion evolution on high-alloy steel 1.4301
Dane BadawczeThe dataset contains the results of topographic imaging of high-alloy stainless steel 1.4301 on which the pitting corrosion process was induced by electrochemical methods. The study of the effects of a local attack allows for conclusions about the intensity and mechanism of this type of corrosion. The file contains atomic force microscopy (AFM) data...
-
Testing the positioning accuracy of GNSS solutions during the tramway track mobile satellite measurements in diverse urban signal reception conditions
Publikacja -
Diagnostics of the tram track shape with the use of the global positioning satellite systems (GPS/Glonass) measurements with a 20 Hz frequency sampling
PublikacjaSatellite geodetic measurements used in the diagnosis of railway tracks require professional receivers and a very high frequency rate of data processing. It stems from a significant speed (10 km/h) kinematic measurements carried out during the passage of a measuring platform. The survey results (positions) of deformed railroad track have waveforms nature requiring additional processing methods and approximations. Due to the announcement...
-
Testing the Positioning Accuracy of GNSS Solutions during the Tramway Track Mobile Satellite Measurements in Diverse Urban Signal Reception Conditions
PublikacjaMobile Global Navigation Satellite System (GNSS) measurements carried out on the railway consist of using satellite navigation systems to determine the track geometry of a moving railway vehicle on a given route. Their purposes include diagnostics, stocktaking, and design work in railways. The greatest advantage of this method is the ability to perform measurements in a unified and coherent spatial reference system, which...
-
Imaging of the effects of pitting corrosion with the use of AFM
Dane BadawczePitting corrosion is a local attack on a metal surface, limited to a point or small area, which appears as a hole. Pitting corrosion is one of the most harmful forms of corrosion due to the fact that it is associated with small, difficult to detect damage, that can even lead to perforation of the structure. A single pit may range in size from micrometers...
-
Simple Millimeter Wave Identification System Based on 60 GHz Van Atta Arrays
PublikacjaThe paper presents a proof-of-concept of a millimeter-wave identification system based on Van Atta array tags in the 60 GHz band. For interrogation of the tags, a vector network analyzer and a measurement transceiver were employed in alternative test configurations. The design, fabrication and measurements of co- and cross-polarized Van Atta arrays are presented in the paper. They can be treated as simple chipless RFID tags with...
-
INFLUENCE OF TACK WELDS DISTRIBUTION AND WELDING SEQUENCE ON THE ANGULAR DISTORTION OF TIG WELDED JOINT
PublikacjaIn this paper the influence of tack welds distribution and welding sequence on angular distortion of the Tungsten Inert Gas (TIG) welded joint was tested. Additionally, the effect of welding current on angular distortion was assessed. For research X2CrTiNb18 (AISI 441) stainless steel (2.5 mm thick) was chosen. During research specimens were prepared with different distributionsof tack...
-
Cryptographers Track at RSA Conference
Konferencje -
Badania systemów powstrzymujących pojazd przed wypadnięciem z drogi - cz. I
PublikacjaTransportation systems are designed and used so as to effectively and safely relocate people, goods and services. Despite this there are numerous hazards that disrupt or damage these systems. Risks such as extreme weather conditions, terrorist threats, landsliders or earthquakes are difficult to predict, manage and mitigate. One of the hazards for transportation systems are accidents, and their impact on the transport functioning...
-
AeroSense Measurements: Wind Tunnel ETH Zurich
Dane BadawczeData from wind tunnel tests of Aerosesne measurement system installed on NACA 0012 at ETH Zurich wind tunnel.
-
Karol Grębowski dr inż.
OsobyKarol Grębowski (dr inż.) pracuje jako adiunkt w Katedrze Technicznych Podstaw Projektowania Architektonicznego na Wydziale Architektury Politechniki Gdańskiej. Jego badania naukowe dotyczą zjawisk szybkozmiennych zachodzących podczas drgań konstrukcji budowlanych, obiektów mostowych (trzęsienia ziemi) oraz badania w zakresie metodologii projektowania budynków stanowiących system ochrony pasywnej (SOP) odpornych na uderzenia pojazdów...
-
Regulacja osi toru w warunkach pomiarów satelitarnych :(program badań) = Geometrical adjustment of the railway track in the conditions of the satellite surveying : (research program)
PublikacjaW pracy zwrócono uwagę na uwarunkowania związane z zastosowaniem technik pomiarów satelitarnych GPS w pomiarach inwentaryzacyjnych linii kolejowych. Wskazano na konieczność nawiązania współpracy pomiędzy specjalistami z dziedziny pomiarów satelitarnych i środowiskiem kolejowym. Może to spowodować radykalną poprawę w zakresie poziomu utrzymania kształtu geometrycznego torów, gdzie występująca obecnie sytuacja budzi poważne zastrzeżenia....
-
Mn-Co spinel coatings on Crofer 22 APU by electrophoretic deposition: Up scaling, performance in SOFC stack at 850 °C and compositional modifications
PublikacjaCeramic coatings for metallic interconnects play a key role in limiting corrosion and chromium evaporation in solid oxide cells. This study presents the upscaling of the electrophoretic deposition (EPD) technique to process Mn-Co spinels on real-dimension Crofer 22 APU interconnects and the test in a SOFC stack. Area specific resistance of long-term test conducted for 5000 h at 850 °C demonstrated that two-steps sintering has a...
-
Ways of performing judo throws, and their efficiency, assessed in the open weight category in All-Japan Judo Championships
PublikacjaThere is no indication that earlier individual attempts in this area have been carried out in Japan. Judo masters including Kano, Koizumi, Kudo, Mifune, Tomiki and others have tried to introduce additional criteria to the classification. The need for so many modifications is a result of the many sport and referee rule changes, as well as to ensure the safety of competitors and to increase the attractiveness of judo contests. Purpose...
-
Just look at to open it up: A biometric verification facility for password autofill to protect electronic documents
PublikacjaElectronic documents constitute specific units of information, and protecting them against unauthorized access is a challenging task. This is because a password protected document may be stolen from its host computer or intercepted while on transfer and exposed to unlimited offline attacks. The key issue is, therefore, making document passwords hard to crack. We propose to augment a common text password authentication interface...
-
OOA-modified Bi-LSTM network: An effective intrusion detection framework for IoT systems
PublikacjaCurrently, the Internet of Things (IoT) generates a huge amount of traffic data in communication and information technology. The diversification and integration of IoT applications and terminals make IoT vulnerable to intrusion attacks. Therefore, it is necessary to develop an efficient Intrusion Detection System (IDS) that guarantees the reliability, integrity, and security of IoT systems. The detection of intrusion is considered...
-
Automatic music genre classification based on musical instrument track separation / Automatyczna klasyfikacja gatunku muzycznego wykorzystująca algorytm separacji dźwięku instrumentó muzycznych
PublikacjaThe aim of this article is to investigate whether separating music tracks at the pre-processing phase and extending feature vector by parameters related to the specific musical instruments that are characteristic for the given musical genre allow for efficient automatic musical genre classification in case of database containing thousands of music excerpts and a dozen of genres. Results of extensive experiments show that the approach...
-
Wczesne wykrywanie spoofingu GNSS typu carry-off
PublikacjaW referacie przedstawiono klasyfikację ataków typu spoofing ukierunkowanych na odbiorniki satelitarnych systemów nawigacyjnych GNSS. W szczególności opisano zaawansowaną formę spoofingu w wariancie tzw. carry-off, polegającym na płynnym przejęciu kontroli nad blokami śledzenia sygnałów w zakłócanym odbiorniku. Sposób realizacji takiego ataku istotnie utrudnia jego wykrycie z użyciem metod dotychczas proponowanych w literaturze....
-
Innovative mobile method to determine railway track axis position in global coordinate system using position measurements performed with GNSS and fixed base of the measuring vehicle
Publikacja -
Innovative mobile method to determine railway track axis position in global coordinate system using position measurements performed with GNSS and fixed base of the measuring vehicle
PublikacjaThe shape of the railway track axis and its position in the global coordinate system are essential when defining design parameters of the railway. Correct reconstruction of these quantities is vital for both verifying the compliance of real track parameters with the design and for diagnosing, as all track deformations can also be defined as deviations of real parameters from their design values. The measurements of quantities related...
-
Instantaneous impedance monitoring of AA 7075 aluminum alloy corrosion in borate buffer with admixed chloride ions
PublikacjaThe study presents a research capabilities of Dynamic Electrochemical Impedance Spectroscopy (DEIS) as a tool used for instantaneous on-line monitoring of corrosion processes on the example of AA 7075 aluminum alloy. A borate buffer with admixed chloride ions in a quantity ranging from 0.05 to 25 mM was used to represent different types of corrosion attack. The surface of samples specimens was evaluated before and after the tests...
-
Scanning electron microscopy studies of the weld decay on SS 304 of water supply pipeline
Dane BadawczeThis dataset contains micrographs made with scanning electron microscope (SEM) Hitachi S-3400N, of the weld decay for water supply system pipelines made of AISI 304 stainless steel. Within the dataset one can see the different corrosion mechanisms. The micrographs were made after the Strauss test (excluding pictures labeled as pits_in_HAZ, done without...
-
Modelling of laminated glass PVB walls of buildings exposed to vehicle impact with different speeds
PublikacjaThis paper presents an analytical model, developed for laminated glass subjected to a low-velocity impact. It has the ability to capture glass cracks as well as large non-linear deformations. It is based mathematically on the firstorder deformation concept, which considers the effect of membrane and transverse shear as well as bending. This theory uses damage mechanics to capture the glass cracking. For this purpose, several experiments...
-
Pomiarowa ocena efektywności systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym
PublikacjaNiniejszy referat dotyczy problemu wykrywania i przeciwdziałania atakom typu spoofing w globalnych systemach nawigacji satelitarnej. Pierwsza część referatu stanowi wprowadzenie w temat spoofingu oraz przegląd sposobów jemu przeciwdziałania. Następnie, przedstawiono autorską koncepcję systemu antyspoofingowego opartego na przetwarzaniu wieloantenowym, a także opisano implementację prototypu tego systemu. Część trzecią poświęcono...
-
SafeCity – a GIS-based tool profiled for supporting decision making in urban development and infrastructure protection
PublikacjaThis paper presents a system for analysis of municipal Critical Infrastructures, which offers integrated tools for target analysis, hazard scenario simulations and spatial analysis within a remotely accessible Web-based Geographic Information System. The system has been applied to research conducted in the city of Gdansk with the aid of blast attack, chemical leakage and flood hazard scenarios, as well as a spatial density algorithm,...
-
The International Symposium on Research in Attacks, Intrusions and Defenses (International Symposium on Recent Advances in Intrusion Detection)
Konferencje -
Comparison of the Ability of Neural Network Model and Humans to Detect a Cloned Voice
PublikacjaThe vulnerability of the speaker identity verification system to attacks using voice cloning was examined. The research project assumed creating a model for verifying the speaker’s identity based on voice biometrics and then testing its resistance to potential attacks using voice cloning. The Deep Speaker Neural Speaker Embedding System was trained, and the Real-Time Voice Cloning system was employed based on the SV2TTS, Tacotron,...
-
Experiment with small objects floating under water in the harbor security aspect.
PublikacjaObservation of the underwater area is the element of general trend which primary purpose is to protect and enhance the safety of the selected region. The aim of the paper is to present the acoustic characteristics of typical objects floating on the surface or under the water, which constitute some knowledge on how to detect these objects. Create a catalog of acoustic signatures and acoustic images of objects mostly floating under...
-
Signatures and acoustic images of objects moving in water
PublikacjaObservation of underwater space is part of a generaltrend, which primary purpose is to protect and increasesafety in the selected area. The basic aim of the paper ispresentation of designated acoustic characteristics typicalfor objects moving on the water surface and under water,which represent some knowledge about detection of theseobjects. Create a catalog of acoustic signature and not onlyacoustic, as well as acoustic images...
-
Collective angst and collective action for progressive city policies: study1
Dane BadawczePaweł Adamowicz, the liberal mayor of Gdańsk, died on January 14, 2019, after being stabbed by a man who rushed onstage during a charity event. Three studies were carried out to analyze the predictors of willingness to engage in collective action for the support of the progressive city policies he initiated. In this study 1 (N = 214), the questionnaire,...
-
Images of topography and mechanical properties (phase imaging) of cast iron samples from water installations
Dane BadawczeMeasurements in contact and semi-contact mode. NTEGRA Prima (NT-MDT) device. CSG 10.
-
Testing Watermark Robustness against Application of Audio Restoration Algorithms
PublikacjaThe purpose of this study was to test to what extent watermarks embedded in distorted audio signals are immune to audio restoration algorithm performing. Several restoration routines such as noise reduction, spectrum expansion, clipping or clicks reduction were applied in the online website system. The online service was extended with some copyright protection mechanisms proposed by the authors. They contain low-level music features...
-
Fuel cell noise data
Dane BadawczeMeasurement data of Hydrogen PEM fuel cels. The voltage fluctuations were measured over single cels of stack of 10 cels.
-
Analiza Globalnego Indeksu Terroryzmu Państw Europejskich
PublikacjaW referacie przytoczono doniesienia raportu Global Terrorism Index 2016 [1] w odniesieniu do sytuacji państw Europejskich. Raport ten publikowany jest co roku przez Instytut Ekonomii i Pokoju (ang. Institute for Economics and Peace). W raporcie tym realizowana jest analiza światowych tendencji i modeli związanych z terroryzmem. Niestety, doniesienia raportu opublikowanego na początku bieżącego roku są zatrważające, zwłaszcza w...
-
Selective jamming of OFDM transmission in NB-IoT radio interface
PublikacjaThe paper presents the concept of smart jamming, which involves selective interference aimed at critical components of the OFDM signal. Research verifying the feasibility of this type of electronic attack are described. A realized testbed for jamming real NB-IoT signals in a downlink is presented. The test results demonstrate the feasibility of realizing selective jamming and its greater effectiveness compared to barrage interference.
-
Path dependence, modularity and the offshoring of (some) physician services
PublikacjaThis paper integrates ideas from modularity and path dependency to explain the potential for and limitations of the offshoring of high value added physician services. While not all medical services are amenable to offshoring, a growing number of physician activities can be viewed as modular components which, at least technically, could be performed remotely. As a result, the presumption that concerns for efficiency dictate how...
-
MAlSim - Mobile Agent Malware Simulator
PublikacjaOne of the problems related to the simulation of attacks against critical infrastructures is the lack of adequate tools for the simulation of malicious software (malware). Malware attacks are the most frequent in the Internet and they pose a serious threat against critical networked infrastructures. To address this issue we developed Mobile Agent Malware Simulator (MAISim). The framework uses the technology of mobile agents and...
-
Automatic Watercraft Recognition and Identification on Water Areas Covered by Video Monitoring as Extension for Sea and River Traffic Supervision Systems
PublikacjaThe article presents the watercraft recognition and identification system as an extension for the presently used visual water area monitoring systems, such as VTS (Vessel Traffic Service) or RIS (River Information Service). The watercraft identification systems (AIS - Automatic Identification Systems) which are presently used in both sea and inland navigation require purchase and installation of relatively expensive transceivers...
-
Software Agents for Computer Network Security
PublikacjaThe chapter presents applications of multi-agent technology for design and implementation of agent-based systems intended to cooperatively solve several critical tasks in the area of computer network security. These systems are Agent-based Generator of Computer Attacks (AGCA), Multi-agent Intrusion Detection and Protection System (MIDPS), Agent-based Environment for Simulation of DDoS Attacks and Defense (AESAD) and Mobile Agent...
-
Portable Raman spectrometer - design rules and applications
PublikacjaRaman spectroscopy has become more popular due to its new prospective field applications in forensic sciences, war against terrorism, environment protection and other field chemical analysis. Raman spectrometers can be miniaturised to portable devices and their price is decreasing due to development of optoelectronics components. Unfortunately, this technology has still numerous limitations that influence their design and limit...
-
Comparative Analysis of Two Polish Hyperbolic Systems AEGIR and JEMIOLUSZKA
PublikacjaGlobal Navigation Satellite System (GNSS) is seen by terrorists or hostile countries as a high value target. Volpe Center report contains the following statement: “During the course of its development for military use and more recent extension to many civilian uses, vulnerabilities of Global Navigation Satellite Systems (GNSS) – in the United States the Global Positioning System (GPS) – have become apparent. The vulnerabilities...
-
Possible uses of crisis situation aiding system in virtual world simulation
PublikacjaMany of the real world crisis situations like spreading fire, hostile units attack, flood, and etc. are commonly used in computer games where a simulation of extensive virtual world is crucial. This paper presents some ideas for possible uses of existing crisis situation aiding system in such environments. Moreover it shows how this kind of system can be taught during subsequent games with a large number of players.
-
Improvement of Fingerprinting Method based on Hill Cipher by using Frequency Domain
PublikacjaThe main goal of this paper is to present the advantages of a digital fingerprinting in a frequency domain over a pixel domain, in case of VoD services (Video on Demand). The paper presents basic issues of a multimedia data protection by digital fingerprinting. It also describes threats to embedded fingerprints from both collusion attacks and from a transmission itself. Possible solution was presented on the example of the DCT...