Filtry
wszystkich: 616
-
Katalog
Wyniki wyszukiwania dla: INTERGRANULAR ATTACK
-
CFD analysis of jet flows ejected from different nozzles
Publikacja -
Measurement of the tram rail profile during a year of operation
Dane BadawczeThe aim of the work was to analyze the wear of rails during operation and to analyze the supplementation of heavy metals in the soil around the tram route, originating from wearing out rails and tram wheels.The dataset contains measurements of rail head coordinates in 9 research sections made in 8 measurement series. The wear of the rails in selected...
-
Subrahmanyam Sappati Ph. D
OsobyTenure track faculty position at the Gdansk University of Technology, Gdansk, Poland. (Nobelium grant fellow)! Working on the behavior of short hydrogen bonds SB both in-ground and excited state in crystals, aqueous & bio environ
-
Influence of windsurfing fin stiffness distribution on the lift-drag characteristics
PublikacjaThis article addresses the problem of determining the hydromechanical loads generated by flexible hydrofoils. The research was done on the example of the composite windsurfing fin for the RS:X monotype class. Despite the assumption of fins identity, everyday practice showed that variations of mechanical properties occur and strongly affect their performance. Therefore, we decided to study the differences between the windsurfing...
-
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting
PublikacjaNDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...
-
Simulating Malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Architektura pomników poświęconych ofiarom ataków terrorystycznych jako kontynuacja realizacji komemoratywnych kształtowanych w postpamięci
Publikacjaarchitecture of Memorials Dedicated to the Victims of terrorist attacks as a continuation of commemorative Structures created within Post-memory Having the rich art of commemorating events of the Second World War as a key reference, this article will try to show how contemporary architectural interven- tions in public space make attempts to respond to the social need of dealing with traumatic events and formulating a new attitude...
-
Government in the metaverse: Requirements and suitability for providing digital public services
PublikacjaDigital government comprises all means to enable governments to interact with their constituents digitally. The metaverse provides a virtual reality environment where various activities can be carried out without physically visiting the places of interest, including the public authorities. Yet, how governments can use the metaverse is unknown. This paper aims to extend the understanding of the metaverse architecture requirements...
-
Diver Observations by Means of Acoustic Methods
PublikacjaSearching for objects, especially small ones, moving under water near its the free surface, is always not an easy task. Designing tools for the detection of such targets is a real challenge when the possibility of a terrorist attack is a real threat. This paper presents some aspects of diver detection by means of acoustics methods, both active (side scan sonar) and passive ones (linear receiving antenna). This approach is quite...
-
Analysis of impact of audio modifications on the robustness of watermark for non-blind architecture
PublikacjaThe aim of this paper is to assess the robustness of the non-blind audio content watermarking scheme proposed by the authors. The authors present the architecture of the designed system along with the employed workflows for embedding and extracting the watermark followed by the implementation phase description and the analysis of the experimental results. Some possible attack simulations on the embedded watermarks are reviewed,...
-
Coastal Cliffs Monitoring and Prediction of Displacements Using Terrestial Laser Scanning
PublikacjaCoastal cliffs are very sensitive to degradation caused by erosion and abrasion. Thus, it is very important to monitor susceptibility of the cliffs in terms of slope angles and ground fall resulting from vertical morphology of the cliffs. The results could be used for example to establish the boundaries of the safe investments zone or retreat infrastructure buildings in case of real threat such as degradation of the objects of...
-
Energy Recovery Analysis in A-Type Pressure Regulation and Measurement Stations in Istanbul, Esenyurt
Publikacja -
International Telecommunication Networks and Applications Conference (Australian Telecommunication Networks and Applications Conference [ATNAC])
Konferencje -
Effects of preheating on laser beam–welded NSSC 2120 lean duplex steel
PublikacjaDuplex stainless steels show sustainable alternative for the conventional austenitic grades, with higher strength, higher resistance against stress corrosion cracking, and lower purchase cost. Thus, duplex stainless steel gains more attention in construction, oil and gas, and chemical industries. Among duplex stainless steels, low nickel and low molybdenum alloyed lean duplex stainless steel are a cost-efective substitution of...
-
Bioterrorism — characteristics and possibilities of prevention
PublikacjaIn the paper bioterrorist threats have been presented. Historical background and possible methods of attacks have been described. The most dangerous pathogens and disease entities have been classified. Selected methods of detection and identification of biological weapon have been presented. The wireless system for threats monitoring — developed at Gdansk University of Technology — has been described.
-
Device for spoofing in global positioning system
PublikacjaThis article describes the device which may be used to generate false GPS signals and emit them into radio communication channel. Such attack is called GPS spoofing. Each GPS receiver which remains in the range of a spoofing device (called spoofer) indicates time and position coordinates which are predetermined by the spoofer’s operator. Spoofing may be used e.g. in order to disable the terrorist group from obtaining correct navigation...
-
Applicability of null-steering for spoofing mitigation in civilian GPS
PublikacjaCivilian GPS signals are currently used in many critical applications, such as precise timing for power grids and telecommunication networks. Spoofing may cause their improper functioning. It is a threat which emerges with the growing availability of GPS constellation simulators and other devices which may be used to perform such attack. Development of the effective countermeasures, covering detection and mitigation, is necessary...
-
Jerzy Konorski dr hab. inż.
OsobyJerzy Konorski otrzymał tytuł mgr inż. telekomunikacji na Poitechnice Gdańskiej, zaś stopień doktora n.t. w dyscyplinie informatyka w Instytucie Podstaw Informatyki PAN. W r. 2007 obronił rozprawę habilitacyjną na Wydziale Elektroniki, Telekomnikacji i Informatyki PG. Jest autorem ponad 150 publikacji naukowych, prowadził projekty naukowo-badawcze finansowane ze środków Komitetu Badań Naukowych, UE, US Air Force Office of Scientific...
-
PTR-MS and electronic nose application for volatile fraction analysis of cigar tobacco
PublikacjaCigar consumers attach great importance to the quality of these products. At the same time, cigars are often expensive, so destructive analytical methods of quality control are not being desired. However, it has been found that there are many volatile organic compounds in their headspace. Because of that, proton transfer reaction–mass spectrometry and electronic nose were used to analyse it. The obtained results were used to distinguish...
-
Receiver-side fingerprinting method for color images based on a series of quaternion rotations
PublikacjaThe proposed method is a new Joint Fingerprinting and Decryption (JFD) method that uses a cipher based on quaternion rotation to encrypt color images that are then sent to all users via multicast transmission. Individual encryption keys depend on the users’ fingerprints, so that a unique fingerprint is introduced into the image during decryption for each decryption key. A simulation-based research was conducted to examine the method’s...
-
Accuracy of Differential Phase Delay Estimation for GPS Spoofing Detection
PublikacjaGPS spoofing is an attack based on transmission of false signals to target receivers, in order to force the computation of incorrect time, position or velocity information. It is a threat which is recently considered with continuously growing awareness. There is a need for effective way of GPS spoofing detection. Many groups of methods are proposed in the literature. Spatial processing methods are considered to be robust in a wide...
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublikacjaThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
Detection of illicit chemicals by portable Raman spectrometer
PublikacjaThe Raman spectrometers can be built as the portable devices and can be used in various places to detect illicit chemicals. This method has become popular due to deficiency of other fast methods that could be applied against terrorist attacks or could help police at their work. The conception of a portable Raman spectrometer has been presented. The description enclosures presentation of the prepared device and its possible applications...
-
Effects of Ca2+, Mg2+, Na+, and K+ substitutions on the microstructure and electrical properties of GdCoO3 ceramics
PublikacjaGdCoO3-δ, Gd0.975Na0.025CoO3-δ, Gd0.98K0.02CoO3-δ, Gd0.98Ca0.02CoO3-δ, and GdCo0.99Mg0.01O3-δ ceramics were prepared via a solid-state reaction route. Among the dopants studied, substitution with Ca2+ slightly enhanced the densfication of GdCoO3 ceramics. All the lattice parameters of the doped ceramics were larger than those of pure GdCoO3-δ ceramic (a = 5.223 Å, b = 5.389 Å and c = 7.451 Å), and their cell volumes increased by...
-
Receiver-side fingerprinting method based on quaternion sandwich product
PublikacjaIn this paper a new receiver-side fingerprinting method for color images is proposed. The proposed method belongs to the group of Joint Fingerprinting and Decryption (JFD) methods. Each component of the color image is represented as a point in 3D space, which is formed by 3 color channels. Encryption and fingerprinting can be interpreted as rotation, scaling and translation of these points. Calculations are performed using quaternion...
-
Study on the student's perception of marketing activities undertaken by Gdansk and Mangalore
Dane BadawczeNowadays, the urban areas very often attract the poor and the unemployed, leading to the creation of neighbourhoods of poverty (slums) and other economic and social problems. All over the World cities include sustainable goals in their development strategies but the question is, whether the city development strategies foresee activities devoted also...
-
Framework for extracting rails and setting-out railway line axis based on UAV photogrammetric measurements
PublikacjaTechnical diagnostics enables assessing the current technical condition of a railway line and adjacent infrastructure, and forecasting its changes over a specific time horizon. One of its elements is the periodic monitoring of rail position and their geometry. This article presents a new framework for the setting-out of a railway track axis. The process presented in the manuscript is based on the specific filtration and extraction...
-
Impedance monitoring of fuel cell stacks
PublikacjaThis paper presents an innovative, electrochemical impedance method for monitoring of electrochemical behaviour of a multi-cell, direct methanol fuel cell (DMFC) device. This method not only provides classical voltage changes at successive cells but also allows their detailed impedance behaviour to be presented. Impedance characteristics of individual cells within a fuel cell stack (depending on actual operating conditions) are...
-
High temperature corrosion of evaporator tubes with thermal sprayed coatings
PublikacjaDegradation examinations of outer surface of low-emission steam boiler evaporator tubes are presented in the paper. Metallographic evaluation of scale morphology, its micro sites chemical composition analysis and distribution of elements on cross sections have been performed. Water-wall tubes were exposed in steam boiler for up to two years period. Common tubes made of 16Mo3 steel suffered sulphide and molten salts corrosions....
-
Approach to security assessment of critical infrastructures' information systems
PublikacjaThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Adapting the pinch point analysis to improve the ORC design process
PublikacjaPinch point analysis can be adapted so as to assist in the early stages of designing the ORC systems. Typically used in determining the working parameters of heat exchangers, it can be employed to improve the heat fitting between the source of heat and the working fluids of the ORC system. To attain the parametric match, an algorithm was built enabling quick estimation of the possible heat reception by the specific working fluid....
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublikacjaAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Framework for extracting rails and setting-out railway line axis based on UAV photogrammetric measurements
Dane BadawczeTechnical diagnostics enables assessing the current technical condition of a railway line and adjacent infrastructure, and to forecast its changes over a specific time horizon. One of its elements is the periodic monitoring of rail position and their geometry. The data set presents a new framework for the setting-out of a railway track axis. The process...
-
Enzymatic activities behind degradation of glucosinolates
PublikacjaMyrosinase (thioglucosidase, EC 3.2.1.147) is the enzyme responsible for the hydrolysis of glucosinolates (GLs). In plant tissue, myrosinase and GLs are sequestered in separate cellular compartments. As a result of cell disruption, e.g., after pathogen attack or on chopping or grinding during food preparation, the myrosinase comes into contact with GLs and catalyzes the hydrolysis of thioglucosidic bond in GL structure. Consequently,...
-
A Multi-Antenna Scheme for Early Detection and Mitigation of Intermediate GNSS Spoofing
PublikacjaThis article presents a method for detecting and mitigating intermediate GNSS spoofing. In this type of attack, at its early stage, a spoofer transmits counterfeit signals which have slight time offsets compared to true signals arriving from satellites. The anti-spoofing method proposed in this article fuses antenna array processing techniques with a multipath detection algorithm. The latter is necessary to separate highly correlated...
-
Practical issues for the implementation of survivability and recovery techniques in optical networks
PublikacjaFailures in optical networks are inevitable. They may occur during work being done for the maintenance of other infrastructures, or on a larger scale as the result of an attack or large-scale disaster. As a result, service availability, an important aspect of Quality of Service (QoS), is often degraded. Appropriate fault recovery techniques are thus crucial to meet the requirements set by the Service Level Agreements (SLAs) between...
-
Design of compound curves adapted to the satellite measurements
PublikacjaThe paper deals with a novelty related to the design of a region for an alternative railway track direction adequate for mobile satellite measurements. The new approach may become particularly useful in the design of the existing track axis control when the determination of both the main track directions becomes impossible. The only solution in that case is to apply to the geometrical system two circular arcs of a different radius,...
-
The process of identification of the track's geometrical layout and the alignment project based on the of satellite measurements
PublikacjaIn the paper a methodology of restoring of railway track’s geometrical shape in a horizontal plane on the base of conducted mobile satellite surveying was presented. The authors proposed a calculating algorithm for designing the track sections placed in horizontal arcs. In the algorithm an analytical methodology with mathematical formulas is applied. The procedure has an universal character, i.e. provides the possibility of varying...
-
Investigation of continuous wave jamming in an IEEE 802.15.4 network
PublikacjaThis paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate...
-
Quality Model for Integrated Security Monitoring and Control in Water Distribution Systems
PublikacjaThis article addresses the problem of drinking water distribution system (DWDS) security in the terms of water quality which in the era of terrorist threat is of high importance to the public. The contribution of this paper is the development of the so called security module to extend a multi-species water quality model. This gives an insight to the situation in DWDS not only under normal operational conditions but also in case...
-
Graph security testing
PublikacjaSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
Optimal shape design of multi-element trawl-doors using local surrogate models
PublikacjaTrawl-doors have a large influence on the fuel consumption of fishing vessels. Design and optimiza-tion of trawl-doors using computational models are a key factor in minimizing the fuel consump-tion. This paper presents an optimization algorithm for the shape design of trawl-door shapes using computational fluid dynamic (CFD) models. Accurate CFD models are computationally expensive. Therefore, the direct use of traditional optimization...
-
Multisine impedimetric monitoring with an in-depth distribution of relaxation times analysis of WE43 and AZ31 magnesium alloys corrosion
PublikacjaThis research aims to develop and utilize an impedance-based tool for monitoring non-stationary electrochemical processes, coupling the multisinusoidal perturbation signal approach and distribution of relaxation times (DRT) analysis for the first time. The approach was used to distinguish independent processes occurring at the surface of AZ31 and WE43 Mg alloys undergoing corrosion in Hank’s Balanced Salt Solution at 37 °C. We...
-
Safety at railway level crossings and Vision Zero
PublikacjaIn this work, safety analysis at the railway level crossings is presented using advanced mathematical modelling. Resistivity of track subgrade panels is taken into account. The analysis does not refer to the assessment of the current regulations. Specific cases of generalized dynamic system are considered by introducing operations S=Δ, S=P defined in space C(N) of real sequences. In this model, generalized discrete exponential...
-
Interpolation methods in GPR tomographic imaging of linear and volume anomalies for cultural heritage diagnostics
PublikacjaThis paper presents results of a ground penetrating radar (GPR) survey conducted in St. Joseph’s Church in Gdańsk, Poland. The aim of the study was to produce tomographic imaging of a renovated floor as well as the objects buried under the floor to detect linear and volume inclusions. The assumed track spacing was meaningfully greater than the single signal spacing in each track, which induced the need for interpolation methods...
-
Assessment of Subsoil Subsidence Under the Railway Surface with the Use of Fuzzy Sets
PublikacjaThe cause of the subsidence of the railway track is the subsidence of the track bed itself and it is often related to the subsidence of the subsoil. Such settlement leads to: uneven longitudinal railways and track twist. These phenomena have a negative impact on the comfort and safety of driving, and in extreme cases lead to a train derailment. It has been shown that the magnitude of these settlements is determined by many parameters...
-
Security and Anonymity in Agent Systems
PublikacjaMany agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...
-
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics
PublikacjaThe contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...
-
Amplifying the Randomness of Weak Sources Correlated With Devices
PublikacjaThe problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...