Filtry
wszystkich: 616
-
Katalog
Wyniki wyszukiwania dla: TERRORIST ATTACK
-
Analysis of hydrodynamic pressure fields of motorboats and pontoons in shallow water
PublikacjaThe article presents the results of calculations of the pressure fields generated by a motorboat at the bottom of a shallow sea. Calculations were made using the boundary elements method (BEM), arranged on the surface of the boat and the bottom of the sea. This method is described in [3], and applied on a free surface linearized boundary condition. Results for four different lengths of motorboats, from 2.85 m to 9.5 m, sea depth...
-
Measurement of the tram rail profile during a year of operation - supplementary data
Dane BadawczeThe aim of the work was to analyze the wear of rails during operation and to analyze the supplementation of heavy metals in the soil around the tram route, originating from wearing out rails and tram wheels.The dataset contains measurements of rail head coordinates in 9 research sections made in 8 measurement series. The wear of the rails in selected...
-
Analysis of impact of lossy audio compression on the robustness of watermark embedded in the DWT domain for non-blind copyright protection
PublikacjaA methodology of non-blind watermarking of the audio content is proposed. The outline of audio copyright problem and motivation for practical applications are discussed. The algorithmic theory pertaining watermarking techniques is briefly introduced. The system architecture together with employed workflows for embedding and extracting the watermarks are described. The implemented approach is described and obtained results are reported....
-
Ring Opening of Triflates Derived from Benzophospholan-3-one Oxides by Aryl Grignard Reagents as a Route to 2‑Ethynylphenyl(diaryl)phosphine Oxides
PublikacjaA new simple method for the synthesis of 2-ethynylphenyl(diaryl)phosphine oxides via ring opening of benzophosphol-3-yl triflates has been developed. This process occurs via nucleophilic attack of a Grignard reagent at the phosphorus center, which results in ring opening and cleavage of a leaving group. The reaction proceeds under mild conditions and, within 15−60 min, leads to a library of previously unavailable 2-ethynylphenylphosphine...
-
Determination of causes of accelerated local corrosion of austenitic steels in water supply systems
PublikacjaThis paper concerns an inspection of a water supply system, made of AISI 304 steel, which showed signs of local corrosion at the weld. Such corrosion caused material perforation after very short periods of operation. It was revealed that steel was sensitised during the welding process. It was also proven that chromium micro-segregation occurred in the alloy leading to galvanic cell formation which initialised the process of pitting...
-
Microscopic examination of the texture of paper products
Dane BadawczeAtomic force microscopy (AFM) can be used to study the state of the paper fibers with the aim of providing qualitative and semi-quantitative information on degradation and aging. The work [1] reports the results of tests of various paper products subjected to deliberate aging processes under the influence of various factors. Chemical and biological...
-
From hobbies, straightforward analysis to serious research – the road to phd degree
PublikacjaThe illustration of the main articles goal is an example of author's academic career course, the aim of which is to obtain a doctoral degree in the field of geodesy and cartography. Today, the most important thing for the young scientist is the devotion to research in certain field of science, which is interested for the large community of scientists. From a psychological point of view, a unity of interest and experiments must...
-
Rafał Leszczyna dr hab. inż.
OsobyDr hab. inż. Rafał Leszczyna jest profesorem uczelni na Wydziale Zarządzania i Ekonomii Politechniki Gdańskiej. W lipcu 2020 r., na podstawie osiągnięcia naukowego w obszarze zarządzania cyberbezpieczeństwem infrastruktur krytycznych w sektorze elektroenergetycznym, uzyskał stopień doktora habilitowanego w dziedzinie nauk inżynieryjno-technicznych, dyscyplina informatyka techniczna i telekomunikacja. W latach 2004–2008 pracował...
-
Possible uses of crisis situation aiding system in virtual world simulation
PublikacjaMany of the real world crisis situations like spreading fire, hostile units attack, flood, and etc. are commonly used in computer games where a simulation of extensive virtual world is crucial. This paper presents some ideas for possible uses of existing crisis situation aiding system in such environments. Moreover, it shows how this kind of system can be taught during subsequent games with a large number of players. As an example...
-
Mesh dependence study for numerical assessment of hydrodynamic characteristics of windsurfing fin
PublikacjaThe presented research aims to assess the drag coefficient and lift coefficient versus angle of attack curves for windsurfing fin. Special attention in the research was being paid to the evaluation of the stall angle value. The angle of incidence for which the stall occurs was searched, and the sensitivity of the solution for the mesh resolution was studied. The mesh resolution sensitivity analysis was done by systematically decreasing...
-
Wojciech Grabowski dr hab.
OsobyWojciech Grabowski, Ph.D. with habilitation, is affiliated researcher at the Institute of Political Science at the University of Gdansk. Working across the disciplines of political science and international relations his research examines regional cooperation of authoritarian states of the Middle East, including the changing role and position of Persian Gulf states (Gulf Cooperation Council) in the regional and global order. He...
-
Biometric identity verification
PublikacjaThis chapter discusses methods which are capable of protecting automatic speaker verification systems (ASV) from playback attacks. Additionally, it presents a new approach, which uses computer vision techniques, such as the texture feature extraction based on Local Ternary Patterns (LTP), to identify spoofed recordings. We show that in this case training the system with large amounts of spectrogram patches may be difficult, and...
-
The Novel Findings About the Hussite’s Warfares in the Gdansk/Danzig Surrounding in the Late Summer of 1433
PublikacjaOne of the most spectacular episodes during the Hussite Wars was the Czech raid through the lands of the Teutonic Order up to the Baltic Sea in 1433. Although historians and then-witnesses focused on the sacked Cistercian Abbey in Oliva and soldiers filling the bottles with seawater, the scale of damages in the main harbour of Prussia and its surroundings has not been the subject of research yet. Furthermore, most scholars treatthe...
-
Measurement of the tram rail profile during a year of operation
Dane BadawczeThe aim of the work was to analyze the wear of rails during operation and to analyze the supplementation of heavy metals in the soil around the tram route, originating from wearing out rails and tram wheels.The dataset contains measurements of rail head coordinates in 9 research sections made in 8 measurement series. The wear of the rails in selected...
-
Subrahmanyam Sappati Ph. D
OsobyTenure track faculty position at the Gdansk University of Technology, Gdansk, Poland. (Nobelium grant fellow)! Working on the behavior of short hydrogen bonds SB both in-ground and excited state in crystals, aqueous & bio environ
-
Influence of windsurfing fin stiffness distribution on the lift-drag characteristics
PublikacjaThis article addresses the problem of determining the hydromechanical loads generated by flexible hydrofoils. The research was done on the example of the composite windsurfing fin for the RS:X monotype class. Despite the assumption of fins identity, everyday practice showed that variations of mechanical properties occur and strongly affect their performance. Therefore, we decided to study the differences between the windsurfing...
-
To Survive in a CBRN Hostile Environment: Application of CAVE Automatic Virtual Environments in First Responder Training
PublikacjaThis paper is of a conceptual nature and focuses on the use of a specific virtual reality environment in civil-military training. We analyzed the didactic potential of so-called CAVE automatic virtual environments for First Responder training, a type of training that fills the gap between First Aid training and the training received by emergency medical technicians. Since real training involves live drills based on unexpected situations,...
-
Simulating Malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Simulating malware with MAlSim
PublikacjaThis paper describes MAlSim - Mobile Agent Malware Simulator - a mobile agent framework developed to address one of the most important problems related to the simulation of attacks against information systems, i.e. the lack of adequate tools for reproducing behaviour of malicious software (malware). The framework can be deployed over the network of an arbitrary information system and it aims at simulating behaviour of each instance...
-
Mitigating Time-Constrained Stolen-Credentials Content Poisoning in an NDN Setting
PublikacjaNDN is a content-centric networking architecture using globally addressable information objects, created by publishers and cached by network nodes to be later accessed by subscribers. Content poisoning attacks consist in the substi-tution by an intruder publisher of bogus objects for genuine ones created by an honest publisher. With valid credentials stolen from an honest publisher, such attacks seem unstoppa-ble unless object...
-
Government in the metaverse: Requirements and suitability for providing digital public services
PublikacjaDigital government comprises all means to enable governments to interact with their constituents digitally. The metaverse provides a virtual reality environment where various activities can be carried out without physically visiting the places of interest, including the public authorities. Yet, how governments can use the metaverse is unknown. This paper aims to extend the understanding of the metaverse architecture requirements...
-
International Telecommunication Networks and Applications Conference (Australian Telecommunication Networks and Applications Conference [ATNAC])
Konferencje -
Analysis of impact of audio modifications on the robustness of watermark for non-blind architecture
PublikacjaThe aim of this paper is to assess the robustness of the non-blind audio content watermarking scheme proposed by the authors. The authors present the architecture of the designed system along with the employed workflows for embedding and extracting the watermark followed by the implementation phase description and the analysis of the experimental results. Some possible attack simulations on the embedded watermarks are reviewed,...
-
Bioterrorism — characteristics and possibilities of prevention
PublikacjaIn the paper bioterrorist threats have been presented. Historical background and possible methods of attacks have been described. The most dangerous pathogens and disease entities have been classified. Selected methods of detection and identification of biological weapon have been presented. The wireless system for threats monitoring — developed at Gdansk University of Technology — has been described.
-
Jerzy Konorski dr hab. inż.
OsobyJerzy Konorski otrzymał tytuł mgr inż. telekomunikacji na Poitechnice Gdańskiej, zaś stopień doktora n.t. w dyscyplinie informatyka w Instytucie Podstaw Informatyki PAN. W r. 2007 obronił rozprawę habilitacyjną na Wydziale Elektroniki, Telekomnikacji i Informatyki PG. Jest autorem ponad 150 publikacji naukowych, prowadził projekty naukowo-badawcze finansowane ze środków Komitetu Badań Naukowych, UE, US Air Force Office of Scientific...
-
Applicability of null-steering for spoofing mitigation in civilian GPS
PublikacjaCivilian GPS signals are currently used in many critical applications, such as precise timing for power grids and telecommunication networks. Spoofing may cause their improper functioning. It is a threat which emerges with the growing availability of GPS constellation simulators and other devices which may be used to perform such attack. Development of the effective countermeasures, covering detection and mitigation, is necessary...
-
PTR-MS and electronic nose application for volatile fraction analysis of cigar tobacco
PublikacjaCigar consumers attach great importance to the quality of these products. At the same time, cigars are often expensive, so destructive analytical methods of quality control are not being desired. However, it has been found that there are many volatile organic compounds in their headspace. Because of that, proton transfer reaction–mass spectrometry and electronic nose were used to analyse it. The obtained results were used to distinguish...
-
Receiver-side fingerprinting method for color images based on a series of quaternion rotations
PublikacjaThe proposed method is a new Joint Fingerprinting and Decryption (JFD) method that uses a cipher based on quaternion rotation to encrypt color images that are then sent to all users via multicast transmission. Individual encryption keys depend on the users’ fingerprints, so that a unique fingerprint is introduced into the image during decryption for each decryption key. A simulation-based research was conducted to examine the method’s...
-
Accuracy of Differential Phase Delay Estimation for GPS Spoofing Detection
PublikacjaGPS spoofing is an attack based on transmission of false signals to target receivers, in order to force the computation of incorrect time, position or velocity information. It is a threat which is recently considered with continuously growing awareness. There is a need for effective way of GPS spoofing detection. Many groups of methods are proposed in the literature. Spatial processing methods are considered to be robust in a wide...
-
Testing Situation Awareness Network for the Electrical Power Infrastructure
PublikacjaThe contemporary electrical power infrastructure is exposed to new types of threats. The cause of such threats is related to the large number of new vulnerabilities and architectural weaknesses introduced by the extensive use of Information and Communication Technologies (ICT) in such complex critical systems. The power grid interconnection with the Internet exposes the grid to new types of attacks, such as Advanced Persistent...
-
Study on the student's perception of marketing activities undertaken by Gdansk and Mangalore
Dane BadawczeNowadays, the urban areas very often attract the poor and the unemployed, leading to the creation of neighbourhoods of poverty (slums) and other economic and social problems. All over the World cities include sustainable goals in their development strategies but the question is, whether the city development strategies foresee activities devoted also...
-
Receiver-side fingerprinting method based on quaternion sandwich product
PublikacjaIn this paper a new receiver-side fingerprinting method for color images is proposed. The proposed method belongs to the group of Joint Fingerprinting and Decryption (JFD) methods. Each component of the color image is represented as a point in 3D space, which is formed by 3 color channels. Encryption and fingerprinting can be interpreted as rotation, scaling and translation of these points. Calculations are performed using quaternion...
-
Framework for extracting rails and setting-out railway line axis based on UAV photogrammetric measurements
PublikacjaTechnical diagnostics enables assessing the current technical condition of a railway line and adjacent infrastructure, and forecasting its changes over a specific time horizon. One of its elements is the periodic monitoring of rail position and their geometry. This article presents a new framework for the setting-out of a railway track axis. The process presented in the manuscript is based on the specific filtration and extraction...
-
Impedance monitoring of fuel cell stacks
PublikacjaThis paper presents an innovative, electrochemical impedance method for monitoring of electrochemical behaviour of a multi-cell, direct methanol fuel cell (DMFC) device. This method not only provides classical voltage changes at successive cells but also allows their detailed impedance behaviour to be presented. Impedance characteristics of individual cells within a fuel cell stack (depending on actual operating conditions) are...
-
High temperature corrosion of evaporator tubes with thermal sprayed coatings
PublikacjaDegradation examinations of outer surface of low-emission steam boiler evaporator tubes are presented in the paper. Metallographic evaluation of scale morphology, its micro sites chemical composition analysis and distribution of elements on cross sections have been performed. Water-wall tubes were exposed in steam boiler for up to two years period. Common tubes made of 16Mo3 steel suffered sulphide and molten salts corrosions....
-
Approach to security assessment of critical infrastructures' information systems
PublikacjaThis study presents an approach to the security assessment of the information systems of critical infrastructures. The approach is based on the faithful reconstruction of the evaluated information system in a computer security laboratory followed by simulations of possible threats against the system. The evidence collected during the experiments, stored and organised using a proprietary system InSAW, may later be used for the creation...
-
Adapting the pinch point analysis to improve the ORC design process
PublikacjaPinch point analysis can be adapted so as to assist in the early stages of designing the ORC systems. Typically used in determining the working parameters of heat exchangers, it can be employed to improve the heat fitting between the source of heat and the working fluids of the ORC system. To attain the parametric match, an algorithm was built enabling quick estimation of the possible heat reception by the specific working fluid....
-
Framework for extracting rails and setting-out railway line axis based on UAV photogrammetric measurements
Dane BadawczeTechnical diagnostics enables assessing the current technical condition of a railway line and adjacent infrastructure, and to forecast its changes over a specific time horizon. One of its elements is the periodic monitoring of rail position and their geometry. The data set presents a new framework for the setting-out of a railway track axis. The process...
-
Security Requirements and Controls for Incident Information Sharing in the Polish Power System
PublikacjaAmong the strategies of protecting information assets of the power system, sharing of information about current cybersecurity incidents between energy operators appears to be a prerequisite. Exchange of information leads to the effective detection of attacks and exploited vulnerabilities as well as the identification of countermeasures. This paper presents the results of continuation of our works on developing a secure and efficient...
-
Practical issues for the implementation of survivability and recovery techniques in optical networks
PublikacjaFailures in optical networks are inevitable. They may occur during work being done for the maintenance of other infrastructures, or on a larger scale as the result of an attack or large-scale disaster. As a result, service availability, an important aspect of Quality of Service (QoS), is often degraded. Appropriate fault recovery techniques are thus crucial to meet the requirements set by the Service Level Agreements (SLAs) between...
-
Enzymatic activities behind degradation of glucosinolates
PublikacjaMyrosinase (thioglucosidase, EC 3.2.1.147) is the enzyme responsible for the hydrolysis of glucosinolates (GLs). In plant tissue, myrosinase and GLs are sequestered in separate cellular compartments. As a result of cell disruption, e.g., after pathogen attack or on chopping or grinding during food preparation, the myrosinase comes into contact with GLs and catalyzes the hydrolysis of thioglucosidic bond in GL structure. Consequently,...
-
A Multi-Antenna Scheme for Early Detection and Mitigation of Intermediate GNSS Spoofing
PublikacjaThis article presents a method for detecting and mitigating intermediate GNSS spoofing. In this type of attack, at its early stage, a spoofer transmits counterfeit signals which have slight time offsets compared to true signals arriving from satellites. The anti-spoofing method proposed in this article fuses antenna array processing techniques with a multipath detection algorithm. The latter is necessary to separate highly correlated...
-
Design of compound curves adapted to the satellite measurements
PublikacjaThe paper deals with a novelty related to the design of a region for an alternative railway track direction adequate for mobile satellite measurements. The new approach may become particularly useful in the design of the existing track axis control when the determination of both the main track directions becomes impossible. The only solution in that case is to apply to the geometrical system two circular arcs of a different radius,...
-
The process of identification of the track's geometrical layout and the alignment project based on the of satellite measurements
PublikacjaIn the paper a methodology of restoring of railway track’s geometrical shape in a horizontal plane on the base of conducted mobile satellite surveying was presented. The authors proposed a calculating algorithm for designing the track sections placed in horizontal arcs. In the algorithm an analytical methodology with mathematical formulas is applied. The procedure has an universal character, i.e. provides the possibility of varying...
-
Investigation of continuous wave jamming in an IEEE 802.15.4 network
PublikacjaThis paper presents how continuous wave jamming affects IEEE 802.15.4 network. To this end, an office-based measurement setup has been proposed. Within the measurement area, 25 nodes have been set up in order to create a IEEE 802.15.4 tree-based test network structure. A dedicated jamming device that generates and transmits a continuous wave signal has been developed. Several tests have been conducted and presented to demonstrate...
-
Multisine impedimetric monitoring with an in-depth distribution of relaxation times analysis of WE43 and AZ31 magnesium alloys corrosion
PublikacjaThis research aims to develop and utilize an impedance-based tool for monitoring non-stationary electrochemical processes, coupling the multisinusoidal perturbation signal approach and distribution of relaxation times (DRT) analysis for the first time. The approach was used to distinguish independent processes occurring at the surface of AZ31 and WE43 Mg alloys undergoing corrosion in Hank’s Balanced Salt Solution at 37 °C. We...
-
Graph security testing
PublikacjaSet S ⊂ V is called secure set iff ∀ X ⊂ S | N [ X ] ∩ S | ≥ | N ( X ) \ S | [3]. That means that every subset of a secure set has at least as many friends (neighbour vertices in S) as enemies (neighbour vertices outside S) and will be defended in case of attack. Problem of determining if given set is secure is co −NP -complete, there is no efficient algorithm solving it [3]. Property testers are algorithms that distinguish inputs...
-
Optimal shape design of multi-element trawl-doors using local surrogate models
PublikacjaTrawl-doors have a large influence on the fuel consumption of fishing vessels. Design and optimiza-tion of trawl-doors using computational models are a key factor in minimizing the fuel consump-tion. This paper presents an optimization algorithm for the shape design of trawl-door shapes using computational fluid dynamic (CFD) models. Accurate CFD models are computationally expensive. Therefore, the direct use of traditional optimization...
-
Assessment of Subsoil Subsidence Under the Railway Surface with the Use of Fuzzy Sets
PublikacjaThe cause of the subsidence of the railway track is the subsidence of the track bed itself and it is often related to the subsidence of the subsoil. Such settlement leads to: uneven longitudinal railways and track twist. These phenomena have a negative impact on the comfort and safety of driving, and in extreme cases lead to a train derailment. It has been shown that the magnitude of these settlements is determined by many parameters...
-
Interpolation methods in GPR tomographic imaging of linear and volume anomalies for cultural heritage diagnostics
PublikacjaThis paper presents results of a ground penetrating radar (GPR) survey conducted in St. Joseph’s Church in Gdańsk, Poland. The aim of the study was to produce tomographic imaging of a renovated floor as well as the objects buried under the floor to detect linear and volume inclusions. The assumed track spacing was meaningfully greater than the single signal spacing in each track, which induced the need for interpolation methods...