Filtry
wszystkich: 876
-
Katalog
- Publikacje 780 wyników po odfiltrowaniu
- Czasopisma 7 wyników po odfiltrowaniu
- Konferencje 2 wyników po odfiltrowaniu
- Osoby 15 wyników po odfiltrowaniu
- Projekty 1 wyników po odfiltrowaniu
- Kursy Online 17 wyników po odfiltrowaniu
- Wydarzenia 1 wyników po odfiltrowaniu
- Dane Badawcze 53 wyników po odfiltrowaniu
Wyniki wyszukiwania dla: JAMMING ATTACKS
-
Improvement of Fingerprinting Method based on Hill Cipher by using Frequency Domain
PublikacjaThe main goal of this paper is to present the advantages of a digital fingerprinting in a frequency domain over a pixel domain, in case of VoD services (Video on Demand). The paper presents basic issues of a multimedia data protection by digital fingerprinting. It also describes threats to embedded fingerprints from both collusion attacks and from a transmission itself. Possible solution was presented on the example of the DCT...
-
Analysis of impact of lossy audio compression on the robustness of watermark embedded in the DWT domain for non-blind copyright protection
PublikacjaA methodology of non-blind watermarking of the audio content is proposed. The outline of audio copyright problem and motivation for practical applications are discussed. The algorithmic theory pertaining watermarking techniques is briefly introduced. The system architecture together with employed workflows for embedding and extracting the watermarks are described. The implemented approach is described and obtained results are reported....
-
Collective angst and collective action for progressive city policies: study4
Dane BadawczeWe conducted this study before the second term of the presidential election in Poland in 2020. Conservative-nationalist President Andrzej Duda’s rival was Rafał Trzaskowski, the liberal Mayor of Warsaw supported by Civic Platform [pol. Platforma Obywatelska] party. 456 residents of Gdańsk participated in the study (313 women, 3 non-binary) with M age...
-
Biometric identity verification
PublikacjaThis chapter discusses methods which are capable of protecting automatic speaker verification systems (ASV) from playback attacks. Additionally, it presents a new approach, which uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. We show that in this case training the system with large amounts of spectrogram patches may be difficult, and...
-
The Effectiveness of Polymer Damper in Damage Reduction of Temporary Steel Grandstand
PublikacjaA large number of accidents involving damage of temporary grandstands during different types of events were observed in the past. The aim of the paper is to analyse numerically the effectiveness of a polymer damper in damage reduction of a temporary steel scaffolding grandstand exposed to dynamic load due to jumping. The element has been installed as a diagonal one at the back part of the structure. The method has been compared...
-
Simulating Malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting
PublikacjaNDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...
-
Architektura pomników poświęconych ofiarom ataków terrorystycznych jako kontynuacja realizacji komemoratywnych kształtowanych w postpamięci
Publikacjaarchitecture of Memorials Dedicated to the Victims of terrorist attacks as a continuation of commemorative Structures created within Post-memory Having the rich art of commemorating events of the Second World War as a key reference, this article will try to show how contemporary architectural interven- tions in public space make attempts to respond to the social need of dealing with traumatic events and formulating a new attitude...
-
Stanisław Barański mgr inż.
OsobyStanisław Barański received BSc in 2019 and MSc in 2020 in informatics at Gdańsk University of Technology. Currently, he is a PhD candidate at the Department of Computer Architecture, Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. His research interests include blockchains and cryptography, especially the issue of blockchain-based internet voting and mitigation of content poisoning...
-
The AFM micrographs of pitting corrosion evolution on high-alloy steel 1.4301
Dane BadawczeThe dataset contains the results of topographic imaging of high-alloy stainless steel 1.4301 on which the pitting corrosion process was induced by electrochemical methods. The study of the effects of a local attack allows for conclusions about the intensity and mechanism of this type of corrosion. The file contains atomic force microscopy (AFM) data...
-
Bioterrorism — characteristics and possibilities of prevention
PublikacjaIn the paper bioterrorist threats have been presented. Historical background and possible methods of attacks have been described. The most dangerous pathogens and disease entities have been classified. Selected methods of detection and identification of biological weapon have been presented. The wireless system for threats monitoring — developed at Gdansk University of Technology — has been described.
-
Dynamic tests of composite footbridge segment – experimental and numerical studies
PublikacjaExperimental dynamic tests and numerical simulations of a 3 meters long segment of a footbridge made of polymer composites are presented in the paper. The span-length is reduced, however dimensions of cross-section are the same as the target footbridge. The segment structure is made of sandwich panels, which consist of fibre reinforced polymer (GFRP) laminates (skins) and a PET foam (core). The first part of the paper contains...
-
Instantaneous impedance monitoring of AA 7075 aluminum alloy corrosion in borate buffer with admixed chloride ions
PublikacjaThe study presents a research capabilities of Dynamic Electrochemical Impedance Spectroscopy (DEIS) as a tool used for instantaneous on-line monitoring of corrosion processes on the example of AA 7075 aluminum alloy. A borate buffer with admixed chloride ions in a quantity ranging from 0.05 to 25 mM was used to represent different types of corrosion attack. The surface of samples specimens was evaluated before and after the tests...
-
Imaging of the effects of pitting corrosion with the use of AFM
Dane BadawczePitting corrosion is a local attack on a metal surface, limited to a point or small area, which appears as a hole. Pitting corrosion is one of the most harmful forms of corrosion due to the fact that it is associated with small, difficult to detect damage, that can even lead to perforation of the structure. A single pit may range in size from micrometers...
-
Mathematical Modeling of Ice Dynamics as a Decision Support Tool in River Engineering
PublikacjaThe prediction of winter flooding is a complicated task since it is affected by many meteorological and hydraulic factors. Typically, information on river ice conditions is based on historical observations, which are usually incomplete. Recently, data have been supplemented by information extracted from satellite images. All the above mentioned factors provide a good background of the characteristics of ice processes, but are not...
-
AeroSense Measurements: Wind Tunnel ETH Zurich
Dane BadawczeData from wind tunnel tests of Aerosesne measurement system installed on NACA 0012 at ETH Zurich wind tunnel.
-
Receiver-side fingerprinting method for color images based on a series of quaternion rotations
PublikacjaThe proposed method is a new Joint Fingerprinting and Decryption (JFD) method that uses a cipher based on quaternion rotation to encrypt color images that are then sent to all users via multicast transmission. Individual encryption keys depend on the users’ fingerprints, so that a unique fingerprint is introduced into the image during decryption for each decryption key. A simulation-based research was conducted to examine the method’s...
-
Programmed metalloporphyrins for self-assembly within light-harvesting stacks: 5,15-dicyano-10,20-bis(3,5-di-tert-butylphenyl)-porphyrinato zinc(II) and its push-pull 15-N,N-dialkylamino-5-cyano congeners obtained by a facile direct amination.
PublikacjaThe title dicyano compound was synthesized via cyanation and it self-assembles in nonpolar solvents giving red-shifted and broad absorption maxima just as the bacteriochlorophylls which are encountered in the light-harvesting organelles of early photosynthetic bacteria. In the crystal, stacks are formed through a hierarchic combination of π-stacking and a CNZn electrostatic interaction. Push−pull 15-N,N-dialkylamino-5-cyano congeners...
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublikacjaThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
Detection of illicit chemicals by portable Raman spectrometer
PublikacjaThe Raman spectrometers can be built as the portable devices and can be used in various places to detect illicit chemicals. This method has become popular due to deficiency of other fast methods that could be applied against terrorist attacks or could help police at their work. The conception of a portable Raman spectrometer has been presented. The description enclosures presentation of the prepared device and its possible applications...
-
Assessment of the ice jam potential on regulated rivers and reservoirs with the use of numerical model results
PublikacjaThis study presents an attempt at estimating the jam potential on rivers with significant anthropogenic intervention in the course or flow characteristics of the river. The DynaRiCE model was used for forecasting both the place and time of an ice jam occurrence. In this modified method, two ice parameters are subjected to analysis, namely the relative ice-to-water velocity (vi/vw),and the ice thickness to single floe thickness...
-
Receiver-side fingerprinting method based on quaternion sandwich product
PublikacjaIn this paper a new receiver-side fingerprinting method for color images is proposed. The proposed method belongs to the group of Joint Fingerprinting and Decryption (JFD) methods. Each component of the color image is represented as a point in 3D space, which is formed by 3 color channels. Encryption and fingerprinting can be interpreted as rotation, scaling and translation of these points. Calculations are performed using quaternion...
-
Analysis of Ferroresonance Mitigation Effectiveness in Auxiliary Power Systems of High-Voltage Substations
PublikacjaFerroresonance in power networks is a dangerous phenomenon, which may result in overcurrents and overvoltages, causing damage to power equipment and the faulty operation of protection systems. For this reason, the possibility of the occurrence of ferroresonance has to be identified, and adequate methods need to be incorporated to eliminate or reduce its effects. The aim of this paper is to evaluate the effectiveness of ferroresonance...
-
SafeCity – a GIS-based tool profiled for supporting decision making in urban development and infrastructure protection
PublikacjaThis paper presents a system for analysis of municipal Critical Infrastructures, which offers integrated tools for target analysis, hazard scenario simulations and spatial analysis within a remotely accessible Web-based Geographic Information System. The system has been applied to research conducted in the city of Gdansk with the aid of blast attack, chemical leakage and flood hazard scenarios, as well as a spatial density algorithm,...
-
Rafał Leszczyna dr hab. inż.
OsobyDr hab. inż. Rafał Leszczyna jest profesorem uczelni na Wydziale Zarządzania i Ekonomii Politechniki Gdańskiej. W lipcu 2020 r., na podstawie osiągnięcia naukowego w obszarze zarządzania cyberbezpieczeństwem infrastruktur krytycznych w sektorze elektroenergetycznym, uzyskał stopień doktora habilitowanego w dziedzinie nauk inżynieryjno-technicznych, dyscyplina informatyka techniczna i telekomunikacja. W latach 2004–2008 pracował...
-
Experimental Study on the Effectiveness of Polyurethane Flexible Adhesive in Reduction of Structural Vibrations
PublikacjaThe aim of the present study is to consider the idea of using polyurethane flexible adhesive in to reduce the vibrations in structures exposed to dynamic loads and evaluate their damping properties in relation to large deformations. Firstly, two aluminium cantilever beams, simulating structural elements (without and with polyurethane layer in the form of tape), were analysed, in order to check the damping of the unconstrained polymer...
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublikacjaAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Jerzy Konorski dr hab. inż.
OsobyJerzy Konorski otrzymał tytuł mgr inż. telekomunikacji na Poitechnice Gdańskiej, zaś stopień doktora n.t. w dyscyplinie informatyka w Instytucie Podstaw Informatyki PAN. W r. 2007 obronił rozprawę habilitacyjną na Wydziale Elektroniki, Telekomnikacji i Informatyki PG. Jest autorem ponad 150 publikacji naukowych, prowadził projekty naukowo-badawcze finansowane ze środków Komitetu Badań Naukowych, UE, US Air Force Office of Scientific...
-
Michał Lech dr inż.
OsobyMichał Lech was born in Gdynia in 1983. In 2007 he graduated from the faculty of Electronics, Telecommunications and Informatics of Gdansk University of Technology. In June 2013, he received his Ph.D. degree. The subject of the dissertation was: “A Method and Algorithms for Controlling the Sound Mixing Processes with Hand Gestures Recognized Using Computer Vision”. The main focus of the thesis was the bias of audio perception caused...
-
Demonstrator technologii C-IED
PublikacjaArtykuł przedstawia budowę i działanie opracowanego na Politechnice Gdańskiej demonstratora technologicznego systemu AEGIS, przeznaczonego do przeciwdziałania atakom z wykorzystaniem prowizorycznych urządzeń wybuchowych detonowanych drogą radiową (RCIED — Radio Controlled Improvised Explosive Devices). Przedstawiono zaimplementowaną oryginalną metodę generowania sygnału zagłuszającego o dowolnie ukształtowanym widmie częstotliwościowym,...
-
Application of polymer element in reduction of temporary steel grandstand vibrations
PublikacjaThe numerical analysis focused on reduction of vibrations of a temporary steel scaffolding grandstand has been conducted in this paper. These types of structures are regularly subjected to dynamic loads which, in conjunction with light and quite slender structural members, may induce dangerous vibrations. To increase their safety, temporary steel grandstands are usually strengthened with the diagonal stiffeners of tubular cross...
-
HYBRID REDUCED MODEL OF ROTOR
PublikacjaIn the paper, the authors describe the method of model reduction of a rotor system. The proposed approach enables to obtain a low order model including e.g. nonproportional damping or the gyroscopic effect. This method is illustrated using the example of a rotor system. First, a model of the system was built without gyroscopic and damping effects by using the rigid finite element method. Next, this model was reduced. Finally, two...
-
Celowe zanieczyszczanie pilotów w łączu w górę w interfejsie 5G NR
PublikacjaReferat poświęcono zagadnieniu zakłócania sygnałów pilotowych w interfejsie radiowym 5G NR. Przedstawiono charakterystykę sygnału referencyjnego DMRS oraz uwarunkowania możliwości jego selektywnego zakłócenia. Opisano schemat transmisji w kanale fizycznym PUSCH, zaimplementowany w oprogramowaniu Sionna. Zaprezen-towano model symulacyjny oraz założenia badań wpływu zanieczyszczenia pilotów na jakość transmisji. Przedsta-wiono wyniki...
-
Rural Design Lectures
Kursy OnlineThe lectures are aiming to provide the students with the general understanding of the vernacular architecture, landscape, future, resilience and history.
-
Theory of Rural Design 2024
Kursy OnlineThe lectures are aiming to provide the students with the general understanding of the vernacular architecture, landscape, future, resilience and history.
-
Security and Anonymity in Agent Systems
PublikacjaMany agent systems have been developed and suggested for commercial application. However, in spite of the significant potential offered by the agent paradigm, the lack of such important properties as security, anonymity and untracebility especially in open dynamical environment, such as the Internet, has blocked the active implementation of agent technologies. Protecting agent systems poses a more demanding challenge comparing...
-
Situational Awareness Network for the Electric Power System: the Architecture and Testing Metrics
PublikacjaThe contemporary electric power system is highly dependent on Information and Communication Technologies which results in its exposure to new types of threats, such as Advanced Persistent Threats (APT) or Distributed-Denial-of-Service (DDoS) attacks. The most exposed components are Industrial Control Systems in substations and Distributed Control Systems in power plants. Therefore, it is necessary to ensure the cyber security of...
-
Amplifying the Randomness of Weak Sources Correlated With Devices
PublikacjaThe problem of device-independent randomness amplification against no-signaling adversaries has so far been studied under the assumption that the weak source of randomness is uncorrelated with the (quantum) devices used in the amplification procedure. In this paper, we relax this assumption, and reconsider the original protocol of Colbeck and Renner using a Santha-Vazirani (SV) source. To do so, we introduce an SV-like condition...
-
Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment
PublikacjaThe smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...
-
Scanning electron microscopy studies of the weld decay on SS 304 of water supply pipeline
Dane BadawczeThis dataset contains micrographs made with scanning electron microscope (SEM) Hitachi S-3400N, of the weld decay for water supply system pipelines made of AISI 304 stainless steel. Within the dataset one can see the different corrosion mechanisms. The micrographs were made after the Strauss test (excluding pictures labeled as pits_in_HAZ, done without...
-
MIC/MBC values of the investigated extracts of propolis. Interactions of selected extracts with azoles and echinocandins.
Dane BadawczeThis dataset contains results of our investigation aiming in determination of antimicrobial potential of the propolis extracts produced in our laboratory. The propolis samples were delivered by Polish beekeepers. Moreover in this dataset we presented results of our investigation aiming in assessment of interaction of the selected extracts of propolis...
-
Pumps, turbines and small hydropower, DaPE, LEC/LAB, sem.05 winter 24/25, (M:320403W0)
Kursy OnlineThe aim of the course is to provide students with knowledge of basic information about hydrotechnical structures used for damming water used for small hydropower, discussing the machine equipment of a small hydropower plant and its cooperation with the power grid, providing basic concepts and principles of operation of hydraulic turbines and pumps and their selection, and the environmental impact of the energetic use of the river.
-
Pumps, turbines and small hydropower, ET, LEC/LAB, sem.07 winter 24/25, (PG_00042108)
Kursy OnlineThe aim of the course is to provide students with knowledge of basic information about hydrotechnical structures used for damming water used for small hydropower, discussing the machine equipment of a small hydropower plant and its cooperation with the power grid, providing basic concepts and principles of operation of hydraulic turbines and pumps and their selection, and the environmental impact of the energetic use of the river.
-
Music Information Retrieval – Soft Computing versus Statistics . Wyszukiwanie informacji muzycznej - algorytmy uczące versus metody statystyczne
PublikacjaMusic Information Retrieval (MIR) is an interdisciplinary research area that covers automated extraction of information from audio signals, music databases and services enabling the indexed information searching. In the early stages the primary focus of MIR was on music information through Query-by-Humming (QBH) applications, i.e. on identifying a piece of music by singing (singing/whistling), while more advanced implementations...
-
The effectiveness of polymer adhesive in reduction of vibrations of structural members
PublikacjaIn this paper, the idea of using polymer adhesive as a damping layer is proposed. An experimental study of two aluminium cantilevered beams has been conducted. One of them presents a plain cantilevered beam, while the second one considers two aluminium beams bonded with a polymer adhesive of different thickness (0,5; 1,2; 1,75; 3,1 and 5 mm). The polymer adhesive considered in the study is a specially designed flexible...
-
Hybrid model of geared rotor system
PublikacjaIn the paper a hybrid model of a geared multirotor system has been developed. The model is obtained by application of both the modal decomposition methodology and the spatial discretization method. Reduced modal model was constructed for the system without gyroscopic and damping effects. The gyroscopic interaction, damping and other phenomena which are difficult to include in the modal approach were modeled by application of simply...
-
Experimental and numerical analysis of an aluminum cantilevered beam with polymer adhesive
PublikacjaIn this paper, experimental and numerical investigation on a composite cantilevered aluminum beam has been conducted. The subject of the study consists of two plain aluminum elements bonded with polymer adhesive of different thickness. It has been proven in the previous study that this kind of material has high damping properties. During an experimental investigation, value of damping ratios have been obtained. The aim of a numerical...
-
Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures
PublikacjaIn the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...
-
Badanie dynamiki platform pływających morskich turbin wiatrowych z zastosowaniem metod numerycznej mechaniki płynów
PublikacjaPraca dotyczy badania ruchu platform pływających pod morskie turbiny wiatrowe. Przedstawiono w niej główne metody obliczeń i przedyskutowano ich zastosowanie. Na przykładzie koncepcji konstrukcji 3-kolumnowej platformy typu Spar przedstawiono metodykę wykonywania obliczeń z zastosowaniem programu AQWA opartego na metodzie dyfrakcyjnej, rozszerzonego o współczynniki wynikające z lepkości wyznaczone za pomocą obliczeń RANSE-CFD....