Wyniki wyszukiwania dla: INTERGRANULAR ATTACK - MOST Wiedzy

Wyszukiwarka

Wyniki wyszukiwania dla: INTERGRANULAR ATTACK

Wyniki wyszukiwania dla: INTERGRANULAR ATTACK

  • Reliability data safety instrumented systems SIS from the functional safety analysis example critical instalation

    Dane Badawcze

    The dataset represents the results of an example of functional safety analysis systems is presented below. It is based on a control system, which consists of some basic components like sensors, programmable logic controllers and valves. It is a part of petrochemical critical installations. The communication between sensor logic controllers and actuators...

  • Influence of permanent magnetic field on wear performance of dry sliding contacts

    Publikacja

    - WEAR - Rok 2011

    Results of experimental studies concerning the influence of permanent magnetic field on wear of dry sliding contact are presented.It was found that magnetic field of horizontal orientation is causing temporary reduction of material's hardness. It also facilitates and accelerates removal process of wear particles from the contact zone.Formation of bulges, consisting of accumulated and compacted anti-ferromagnetic material produced...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Technical diagnostics and monitoring of traction current collectors

    Publikacja

    - Rok 2009

    New evaluation methods of the technical condition of rolling stock current collectors are proposed in this paper. The method of automatic measurement of the pantograph static force characteristic, realized when the vehicle runs through the test section of the track with especially prepared overhead line height distribution, has been practically implemented by the Polish Railways. The method of testing the slipper spring suspension...

  • Efekty egoistycznych ataków na poziomie mac w sieciach ad hoc o topologii wieloskokowej

    Stacje sieci ad hoc mogą manipulować parametrami dostępu do medium transmisyjnego dla osiągnięcia nienależnie wysokiej jakości usług. Dla środowiska sieci ad hoc o topologii wieloskokowej rozważane są ataki na mechanizmy odłożenia transmisji i klasyfikacji ruchu, przeprowadzane zarówno w stosunku do przepływów źródłowych jak i tranzytowych. Wyniki pozwalają wstępnie ocenić efekty takich ataków oraz skuteczność mechanizmów obronnych.

  • Evaluation of Open Source SIEM for Situation Awareness Platform in the Smart Grid Environment

    Publikacja

    The smart grid as a large-scale system of systems has an exceptionally large surface exposed to cyber-attacks, including highly evolved and sophisticated threats such as Advanced Persistent Threats (APT) or Botnets. When addressing this situation the usual cyber security technologies are prerequisite, but not sufficient. The smart grid requires developing and deploying an extensive ICT infrastructure that supports significantly...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • The effect of pre-hydrogen charging on corrosion behaviour of superduplex stainless steel welded joints

    Publikacja

    The paper presents results of research undertaken to determine the influence of hydrogen on passivity and corrosion resistance of 2507 super duplex stainless steel welded joints. Butt welded joints were made with low heat input using flux corded arc welding (FCAW) method. Coupons of 5.0 x 5.0 mm were cut from the welded joints containing weld metal (WM), heat affected zone (HAZ) and parent metal (PM). Hydrogen was introduced...

  • EE-ISAC—Practical Cybersecurity Solution for the Energy Sector

    Publikacja

    - ENERGIES - Rok 2022

    A recent survey of cybersecurity assessment methods proposed by the scientific community revealed that their practical adoption constitutes a great challenge. Further research that aimed at identifying the reasons for that situation demonstrated that several factors influence the applicability, including the documentation level of detail, the availability of supporting tools, and the continuity of support. This paper presents the...

    Pełny tekst do pobrania w portalu

  • Deep Learning-Based Intrusion System for Vehicular Ad Hoc Networks

    Publikacja

    - CMC-Computers Materials & Continua - Rok 2020

    The increasing use of the Internet with vehicles has made travel more convenient. However, hackers can attack intelligent vehicles through various technical loopholes, resulting in a range of security issues. Due to these security issues, the safety protection technology of the in-vehicle system has become a focus of research. Using the advanced autoencoder network and recurrent neural network in deep learning, we investigated...

    Pełny tekst do pobrania w portalu

  • Opinia techniczna rozjazdu zwyczajnego Rz 49E1-190-1:9 z szynami ochronnymi

    Publikacja

    - Rok 2011

    Opinia techniczna rozjazdu zwyczajnego Rz 49E1-190-1:9 z szynami ochronnymi dla firmy TRACK TEC KOLTRAM

  • Tonality Estimation and Frequency Tracking of Modulated Tonal Components

    A novel method for tonality estimation and frequency tracking of tonal components modulated in frequency and amplitude is presented. The algorithm detects the local maxima of magnitude spectra corresponding to three contiguous frames of a signal and matches them into the tonal track candidates. The magnitude-based and phase-based methods are used to estimate the frequency jumps between spectrum maxima belonging to the tonal track...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Stanisław Barański

    Osoby

    Stanisław Barański received BSc in 2019 and MSc in 2020 in informatics at Gdańsk University of Technology. Currently, he is a PhD candidate at the Department of Computer Architecture, Faculty of Electronics, Telecommunications and Informatics, Gdansk University of Technology. His research interests include blockchains and cryptography, especially the issue of blockchain-based internet voting and mitigation of content poisoning...

  • Research project BRIK: development of an innovative method for determining the precise trajectory of a railway vehicle

    Publikacja

    - Przegląd Komunikacyjny - Rok 2019

    In the paper the essential assumptions regarding a research project implemented by a consortium of Gdansk University of Technology and Gdynia Maritime University are presented. The project has been commissioned by National Center of Research and Development with cooperation with Polish Railways (PKP Polskie Linie Kolejowe S.A.). The project is focused in implementation of modern measurement techniques using Global Navigation Positioning...

    Pełny tekst do pobrania w portalu

  • Selektywne zakłócanie transmisji OFDM w interfejsie radiowym NB-IoT

    W artykule przedstawiono zagadnienie tzw. inteligentnego zagłuszania, polegającego na selektywnym zakłócaniu krytycznych składowych sygnału OFDM. Opisane zostały badania weryfikujące możliwość przeprowadzenia tego rodzaju ataku elektronicznego. Przedstawiono zrealizowane stanowisko badawcze, umożliwiające zakłócanie rzeczywistych sygnałów NB-IoT w łączu w dół. Wyniki badań wykazują możliwość realizacji selektywnego zagłuszania...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Implementation of DEIS for reliable fault monitoring and detection in PEMFC single cells and stacks

    Dynamic Electrochemical Impedance Spectroscopy (DEIS) was presented as novel method for diagnostic and monitoring of PEMFC stack and single cells operation. Impedance characteristics were obtained simultaneously with current - voltage characteristics for stack and each individual cell. Impedance measurements were performed in galvanodynamic mode. It allowed to compare performance of each cell and identification of faulty cell operation...

    Pełny tekst do pobrania w portalu

  • Correction of determined coordinates of railway tracks in mobile satellite measurements

    Publikacja

    - Diagnostyka - Rok 2020

    This article examines one of the basic issues related to the technique of mobile satellite measurements in railway tracks. This problem concerns the correction of the determined coordinates of the track centerline. The need to perform this operation results from the GNSS receivers positioning at a certain height above the level of the existing track axis, leading to longitudinal and lateral shifts of antennas. The key problem here...

    Pełny tekst do pobrania w portalu

  • Electron attachment to hexafluoropropylene oxide (HFPO)

    Publikacja
    • M. Zawadzki
    • A. Chachereau
    • J. Kočišek
    • C. Franck
    • J. Fedor

    - JOURNAL OF CHEMICAL PHYSICS - Rok 2018

    We probe the electron attachment in hexafluoropropylene oxide (HFPO), C3F6O, a gas widely used in plasma technologies. We determine the absolute electron attachment cross section using two completely different experimental approaches: (i) a crossed-beam experiment at single collision conditions (local pressures of 5 × 10−4 mbar) and (ii) a pulsed Townsend experiment at pressures of 20–100 mbar. In the latter method, the cross sections...

    Pełny tekst do pobrania w portalu

  • Agents in Simulation of Cyberattacks to Evaluate Security of Critical Infrastructures

    Publikacja

    - Rok 2013

    In the last years critical infrastructures have become highly dependent on the information technologies and exposed to cyberattacks. Because the effects of the attacks can be detrimental, it is crucial to comprehensively asses the security of the infrastructures' information systems. This chapter describes MAlSim - the simulator of malicious software based on software agents, developed for the needs of a testbed for critical infrastructures...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • UG students’ perception of city’s corporation activities aimed at encouraging young educated to study and settle in Gdansk in Poland.

    Dane Badawcze

    Nowadays, the urban areas very often attract the poor and the unemployed, leading to the creation of neighbourhoods of poverty (slums) and other economic and social problems. All over the World cities include sustainable goals in their development strategies but the question is, whether the city development strategies foresee activities devoted also...

  • How to fund an additional secular function in the monumental church?

    Publikacja

    - Rok 2018

    The implementation of a new public function into the non-used church spaces like attics or cellars in context of revitalizing a lawfully protected historical city areas have diversified aspects. The article describes the financial aspect of adaptation of omitted spaces of monumental sacral buildings by presenting funding possibilities in the European Union countries available in period of 2017-2018 and the funds planned for the...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Power equalization of AES FPGA implementation

    This paper briefly introduces side channel attacks on cryptographic hardware with special emphasis on differential power analysis(DPA). Based on existing countermeasures against DPA, design method combining power equalization for synchronous and combinatorialcircuits has been proposed. AES algorithm has been implemented in Xilinx Spartan II-E field programmable gate array (FPGA) deviceusing the standard and power-equalized methods....

    Pełny tekst do pobrania w portalu

  • An innovative approach to the forecasting of energetic effects while wood sawing

    Publikacja

    - Rok 2013

    In the classical approach, energetic effects (cutting forces and cutting power) of wood sawing process are generally calculated on the basis of the specific cutting resistance, which is in the case of wood cutting the function of more or less important factors. On the other hand, the cutting forces (power) problem may be tackled with an innovative, up-to-date fundamental analysis of the mechanics of sawing based on modern fracture...

  • An Innovative Approach to the Forecasting of Energetic Effects While Wood Sawing

    Publikacja

    - Drvna Industrija - Rok 2014

    In the classical approach, energetic effects (cutting forces and cutting power) of wood sawing process are generally calculated on the basis of the specifi c cutting resistance, which is in the case of wood cutting the function of more or less important factors. On the other hand, the cutting forces (power) problem may be tackled with an innovative, up-to-date fundamental analysis of the mechanics of sawing based on modern fracture mechanics....

    Pełny tekst do pobrania w portalu

  • Detection and Model of Thermal Traces Left after Aggressive Behavior of Laboratory Rodents

    Automation of complex social behavior analysis of experimental animals would allow for faster, more accurate and reliable research results in many biological, pharmacological, and medical fields. However, there are behaviors that are not only difficult to detect for the computer, but also for the human observer. Here, we present an analysis of the method for identifying aggressive behavior in thermal images by detecting traces...

    Pełny tekst do pobrania w portalu

  • Idea zrównoważonego rozwoju

    Publikacja

    Zrównoważony rozwój to termin bardzo popularny, w ostatnich latach pojawiający się nie tylko w aktach prawnych, statutach i dokumentach strategicznych, lecz także w publikacjach naukowych czy wnioskach grantowych. Dla wielu osób mimo jasności koncepcji i rozumienia przekazu termin ten jest niejednoznaczny i pozwala na dowolną interpretację.

  • Integrated Functional Safety and Cybersecurity Evaluation in a Framework for Business Continuity Management

    Publikacja

    This article outlines an integrated functional safety and cybersecurity evaluation approach within a framework for business continuity management (BCM) in energy companies, including those using Industry 4.0 business and technical solutions. In such companies, information and communication technology (ICT), and industrial automation and control system (IACS) play important roles. Using advanced technologies in modern manufacturing...

    Pełny tekst do pobrania w portalu

  • Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia

    This paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). The solution proposed here is a new joint fingerprinting and decryption method which meets the requirements for both imperceptibility and robustness of fingerprints and scalability in terms of design and distribution of fingerprinted multimedia content. The proposed method uses a simple block cipher based on matrix...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Educational and cognitive aspects of adaptation of nonuse spaces in monumental sacral objects.

    Publikacja

    - Rok 2018

    The area of attics and towers in historic churches in Europe are yet quite inaccessible places for visitors, shrouded in the atmosphere of mysticism, hiding many secrets. Introduction of the new public function into the non-used zones of the monumental sacral objects has many aspects including educational and cognitive ones which are discussed in the following article. The article indicates items that can be found in the zone above...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Earthworks calculations due to reconstruction of railway geometrical layout

    Publikacja

    - Rok 2014

    The paper characterizes continuation of ongoing work of computer program MUGO which is connected with earthworks. The program is related to the modernization of the railway track layout. The methodology for the calculating the size of earthworks in the areas of embankments on the two way railway line is discussed in detail.

  • Experimental investigation of the PEM fuel cells performance for automotive and stationary applications

    The aim of the study was to provide dynamic characteristics of the PEM fuel cell system consisted of Nexa modules, provide steady-state characteristics of the for different values of air excess ratio and steady-state characteristics for different stack temperatures and given load.

  • Natural ventilation performance of family building in cold climate during windless time

    In this paper, the field measurements results are presented on the stack ventilation effect. The paper presents the results of performance (air change rate ACH) natural ventilation for building with inlet gap measured for the transitional season (between heating and summer season). The measurements were performed during a windless time. The house was located in northern Poland, in a cold climate region. The measurement system...

    Pełny tekst do pobrania w portalu

  • Accuracy assessment of mobile satellite measurements in relation to the geometrical layout of rail tracks

    The paper presents the campaigns of mobile satellite measurements, carried out in 2009–2015 on the railway and tram lines. The accuracy of the measurement method has been analysed on the basis of the results obtained in both horizontal and vertical planes. The track axis deviation from the defined geometric shape has been analysed in the areas clearly defined in terms of geometry, i.e. on the straight sections and sections with...

    Pełny tekst do pobrania w portalu

  • Influence of compaction effectiveness on interlayer bonding of asphalt layers

    Publikacja

    - Rok 2014

    The paper presents the results of research on the interlayer bonding of asphalt layers compacted in the laboratory and in the field. To measure the interlayer bonding at a temperature of 20°C the Leutner test apparatus was used and load was applied at a rate of 50 mm/minute. Three types of interlayer interfaces were tested: no tack coat and tack coats made of two types of the pure bitumen emulsions. Four compaction techniques were...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Magnetic disturbances caused by magnetic contamination of plastics

    In the study of low magnetic fields precision magnetometers working in a differential system are used. Two optically pumped magnetometers working in a differential system allow for precise measuring of disturbances in the magnetic field. In order to attain high accuracy of magnetic field measurement, it is necessary to use appropriate materials for the construction of a magnetometric system, particularly of those located closely...

    Pełny tekst do pobrania w portalu

  • Defending against Fake VIP in Scant-Transparency Information Systems with QoS Differentiation

    Publikacja

    In client-server information systems with quality of service (QoS) differentiation, Client may deplete Server’s resources by demanding unduly high QoS level. Such QoS abuse has eluded systematic treatment; known defenses using Client authorization, payments, or service request inspection prior to QoS assignment, are heuristic and environment-specific. We offer a game-theoretic approach on the premise that a service request is occasionally...

    Pełny tekst do pobrania w portalu

  • Advanced oxidation processes for the removal of mono and polycyclic aromatic hydrocarbons – A review

    Publikacja

    Aromatic hydrocarbons (AHs) are toxic environmental contaminants presented in most of the environmental matrices. Advanced oxidation processes (AOPs) for the removal of AHs in the account of complete mineralization from various environmental matrices have been reviewed in this paper. An in-depth discussion on various AOPs for mono (BTEX) and polyaromatic hydrocarbons (PAHs) and their derivatives is presented. Most of the AOPs were...

    Pełny tekst do pobrania w portalu

  • Device-independent quantum key distribution based on measurement inputs

    Publikacja

    - PHYSICAL REVIEW A - Rok 2015

    We provide an analysis of a family of device-independent quantum key distribution (QKD) protocols that has the following features. (a) The bits used for the secret key do not come from the results of the measurements on an entangled state but from the choices of settings. (b) Instead of a single security parameter (a violation of some Bell inequality) a set of them is used to estimate the level of trust in the secrecy of the key....

    Pełny tekst do pobrania w portalu

  • Analysis of the Ways to Identify Rail Running Surface Defects by Means of Vibration Signals

    Publikacja

    - Problemy Kolejnictwa - Rok 2020

    Th e article discusses a preliminary concept of a method enabling the identifi cation of chosen rail running surface defects, such as squats, spalling, and running surface defects, by analysing the parameters of vibration signals. It features a description of the methodology of the conducted tests, the scope thereof, and the selection of the measurement points with specifi c defect types. Th e article covers selected results of...

    Pełny tekst do pobrania w portalu

  • Distributed protection against non-cooperative node behavior in multi-hop wireless networks

    Publikacja

    An important security problem in today's distributed data networks is the prevention of non-cooperative behavior i.e., attacks consisting in the modification of standard node operation to gain unfair advantage over other system nodes. Such a behavior is currently feasible in many types of computer networks whose communication protocols are designed to maximize the network performance assuming full node cooperation. Moreover, it...

  • Guaranteeing Threshold Attendance of W/WSAN nodes in a reverted security paradigm

    Publikacja

    - Rok 2014

    We consider a Wireline/Wireless Sensor and Actor Network composed of sensor/actor nodes and a data sink/command center (DSCC). Each node controls a generic device that can be in- or out-of-service, corresponding to the ENABLED or DISABLED node state. The node senses the device's intention to change state, and notifies and/or requests the DSCC for authorization to act upon the device. Motivated by requirements for critical infrastructures...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Security Information Sharing for the Polish Power System

    Publikacja

    - Rok 2015

    The Polish Power System is becoming increasingly more dependent on Information and Communication Technologies which results in its exposure to cyberattacks, including the evolved and highly sophisticated threats such as Advanced Persistent Threats or Distributed Denial of Service attacks. The most exposed components are SCADA systems in substations and Distributed Control Systems in power plants. When addressing this situation...

  • Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining

    This paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • RECODIS: Resilient Communication Services Protecting End-user Applications from Disaster-based Failures

    Publikacja
    • J. Rak
    • D. Hutchison
    • E. Calle
    • T. Gomes
    • M. Gunkel
    • P. Smith
    • J. Tapolcai
    • S. Verbrugge
    • L. Wosinska

    - Rok 2016

    Disaster-based failures can seriously disrupt any communication network, making its services unavailable. Such disruptions may be caused by natural disasters, technology-related failures, or malicious attacks, and they are observably increasing in number, intensity and scale. When network services that are a part of critical infrastructure become unavailable, commercial and/or societal problems are inevitable. The issue of limiting...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Service-based Resilience for Embedded IoT Networks

    Publikacja

    - Rok 2020

    Embedded IoT networks are the backbone of safety-critical systems like smart factories, autonomous vehicles, and airplanes. Therefore, resilience against failures and attacks should be a prior concern already in their design stage. In this study, we introduce a service-based network model as an MILP optimization problem for the efficient deployment of a service overlay to the embedded network by meeting QoS and resilience requirements....

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Improving the Survivability of Carrier Networks to Large-Scale Disasters

    Publikacja
    • A. de Sousa
    • J. Rak
    • F. Barbosa
    • D. Santos
    • D. Mehta

    - Rok 2020

    This chapter is dedicated to the description of methods aiming to improve the survivability of carrier networks to large-scale disasters. First, a disaster classification and associated risk analysis is described, and the disaster-aware submarine fibre-optic cable deployment is addressed aiming to minimize the expected costs in case of natural disasters. Then, the chapter addresses the improvement of the network connectivity resilience...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • Dynamical description of quantum computing: generic nonlocality of quantumnoise

    Publikacja

    We develop a dynamical non-Markovian description of quantum computing in the weak-coupling limit, in the lowest-order approximation. We show that the long-range memory of the quantum reservoir (such as the 1/t4 one exhibited by electromagnetic vacuum) produces a strong interrelation between the structure of noise and the quantum algorithm, implying nonlocal attacks of noise. This shows that the implicit assumption of quantum error...

    Pełny tekst do pobrania w portalu

  • Several notes on technical modernization of a historical building

    Publikacja

    - Rok 2013

    This paper describes methods and means used during the renovation process of several elements of a building – the assembly hall, inner courtyards and attics of the main building at Gdansk University of Technology, both in design and construction domains. A tissue of a historic building required special approach to these tasks, with special emphasis on good recognition of problems, careful planning and consistent implementing of...

    Pełny tekst do pobrania w serwisie zewnętrznym

  • MEASUREMENT O F HEALTHCARE SYSTEM EFFICIENCY IN OECD COUNTRIES

    Increased spending on healthcare systems in many countries tends to attract attention to their efficiency. The aim of this paper is to evaluate the efficiency of healthcare systems in the OECD countries and indicate causes of inefficiency by applying Data Envelopment Analysis (DEA) and using additive and super-efficiency models. The homogeneity of the sample is assessed and outliers are excluded. A ranking is established on the...

    Pełny tekst do pobrania w portalu

  • The complete lists of 1D reversible number-conserving cellular automata with radius one of up to 7 states

    Dane Badawcze
    open access

    This dataset contains complete lists of all one-dimensional reversible number-conserving k-ary cellular automata with radius one of up to 7 states, i.e. with state sets {0,1}, {0,1,2}, {0,1,2,3}, {0,1,2,3,4}, {0,1,2,3,4,5} and {0,1,2,3,4,5,6}.

  • Deep eutectic solvents vs ionic liquids: Similarities and differences

    Publikacja

    - MICROCHEMICAL JOURNAL - Rok 2020

    Deep eutectic solvents (DES) were introduced as an alternative to ionic liquids (IL) to overcome the drawbacks of IL solvents. However, some authors consider them to be a subclass of ILs. In contrast, other authors emphasize that these are by their nature independent, different groups of substances. Thus, the question arises: Which solvent group should DESs belong to? Maybe a new class should be added to the existing ones. The...

    Pełny tekst do pobrania w portalu

  • Threat intelligence platform for the energy sector

    In recent years, critical infrastructures and power systems in particular have been subjected to sophisticated cyberthreats, including targeted attacks and advanced persistent threats. A promising response to this challenging situation is building up enhanced threat intelligence that interlinks information sharing and fine-grained situation awareness. In this paper a framework which integrates all levels of threat intelligence...

    Pełny tekst do pobrania w portalu